Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/Firefox@19.0.0
Typemozilla
Namespace
NameFirefox
Version19.0.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version19.0.2
Latest_non_vulnerable_version149.0.2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1yze-uqub-47gw
vulnerability_id VCID-1yze-uqub-47gw
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0774.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0774.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0774
reference_id
reference_type
scores
0
value 0.00657
scoring_system epss
scoring_elements 0.71069
published_at 2026-04-18T12:55:00Z
1
value 0.00657
scoring_system epss
scoring_elements 0.70966
published_at 2026-04-01T12:55:00Z
2
value 0.00657
scoring_system epss
scoring_elements 0.71016
published_at 2026-04-13T12:55:00Z
3
value 0.00657
scoring_system epss
scoring_elements 0.71062
published_at 2026-04-16T12:55:00Z
4
value 0.00657
scoring_system epss
scoring_elements 0.70976
published_at 2026-04-02T12:55:00Z
5
value 0.00657
scoring_system epss
scoring_elements 0.70994
published_at 2026-04-04T12:55:00Z
6
value 0.00657
scoring_system epss
scoring_elements 0.70969
published_at 2026-04-07T12:55:00Z
7
value 0.00657
scoring_system epss
scoring_elements 0.7101
published_at 2026-04-08T12:55:00Z
8
value 0.00657
scoring_system epss
scoring_elements 0.71025
published_at 2026-04-09T12:55:00Z
9
value 0.00657
scoring_system epss
scoring_elements 0.71048
published_at 2026-04-11T12:55:00Z
10
value 0.00657
scoring_system epss
scoring_elements 0.71033
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0774
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=827193
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=827193
5
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16797
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16797
6
reference_url http://www.mozilla.org/security/announce/2013/mfsa2013-25.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2013/mfsa2013-25.html
7
reference_url http://www.ubuntu.com/usn/USN-1729-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-1
8
reference_url http://www.ubuntu.com/usn/USN-1729-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-2
9
reference_url http://www.ubuntu.com/usn/USN-1748-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1748-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=911842
reference_id 911842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=911842
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0774
reference_id CVE-2013-0774
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0774
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0774
reference_id CVE-2013-0774
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0774
24
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-25
reference_id mfsa2013-25
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-25
26
reference_url https://usn.ubuntu.com/1729-1/
reference_id USN-1729-1
reference_type
scores
url https://usn.ubuntu.com/1729-1/
27
reference_url https://usn.ubuntu.com/1748-1/
reference_id USN-1748-1
reference_type
scores
url https://usn.ubuntu.com/1748-1/
fixed_packages
0
url pkg:mozilla/Firefox@19.0.0
purl pkg:mozilla/Firefox@19.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@19.0.0
aliases CVE-2013-0774
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1yze-uqub-47gw
1
url VCID-7r7c-n89c-3qbe
vulnerability_id VCID-7r7c-n89c-3qbe
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0271.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0271.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-0272.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0272.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0776.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0776.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0776
reference_id
reference_type
scores
0
value 0.00653
scoring_system epss
scoring_elements 0.70947
published_at 2026-04-18T12:55:00Z
1
value 0.00653
scoring_system epss
scoring_elements 0.70836
published_at 2026-04-01T12:55:00Z
2
value 0.00653
scoring_system epss
scoring_elements 0.70895
published_at 2026-04-13T12:55:00Z
3
value 0.00653
scoring_system epss
scoring_elements 0.70941
published_at 2026-04-16T12:55:00Z
4
value 0.00653
scoring_system epss
scoring_elements 0.70851
published_at 2026-04-02T12:55:00Z
5
value 0.00653
scoring_system epss
scoring_elements 0.70869
published_at 2026-04-04T12:55:00Z
6
value 0.00653
scoring_system epss
scoring_elements 0.70843
published_at 2026-04-07T12:55:00Z
7
value 0.00653
scoring_system epss
scoring_elements 0.70887
published_at 2026-04-08T12:55:00Z
8
value 0.00653
scoring_system epss
scoring_elements 0.70903
published_at 2026-04-09T12:55:00Z
9
value 0.00653
scoring_system epss
scoring_elements 0.70926
published_at 2026-04-11T12:55:00Z
10
value 0.00653
scoring_system epss
scoring_elements 0.70911
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0776
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=796475
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=796475
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681
29
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16666
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16666
30
reference_url http://www.debian.org/security/2013/dsa-2699
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2699
31
reference_url http://www.mozilla.org/security/announce/2013/mfsa2013-27.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2013/mfsa2013-27.html
32
reference_url http://www.ubuntu.com/usn/USN-1729-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-1
33
reference_url http://www.ubuntu.com/usn/USN-1729-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-2
34
reference_url http://www.ubuntu.com/usn/USN-1748-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1748-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=911844
reference_id 911844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=911844
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0776
reference_id CVE-2013-0776
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0776
58
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
59
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-27
reference_id mfsa2013-27
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-27
60
reference_url https://access.redhat.com/errata/RHSA-2013:0271
reference_id RHSA-2013:0271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0271
61
reference_url https://access.redhat.com/errata/RHSA-2013:0272
reference_id RHSA-2013:0272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0272
62
reference_url https://usn.ubuntu.com/1729-1/
reference_id USN-1729-1
reference_type
scores
url https://usn.ubuntu.com/1729-1/
63
reference_url https://usn.ubuntu.com/1748-1/
reference_id USN-1748-1
reference_type
scores
url https://usn.ubuntu.com/1748-1/
fixed_packages
0
url pkg:mozilla/Firefox@19.0.0
purl pkg:mozilla/Firefox@19.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@19.0.0
aliases CVE-2013-0776
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7r7c-n89c-3qbe
2
url VCID-ccxh-pw22-3qes
vulnerability_id VCID-ccxh-pw22-3qes
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0271.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0271.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-0272.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0272.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0775.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0775.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0775
reference_id
reference_type
scores
0
value 0.00914
scoring_system epss
scoring_elements 0.7592
published_at 2026-04-18T12:55:00Z
1
value 0.00914
scoring_system epss
scoring_elements 0.75821
published_at 2026-04-01T12:55:00Z
2
value 0.00914
scoring_system epss
scoring_elements 0.75879
published_at 2026-04-13T12:55:00Z
3
value 0.00914
scoring_system epss
scoring_elements 0.75917
published_at 2026-04-16T12:55:00Z
4
value 0.00914
scoring_system epss
scoring_elements 0.75824
published_at 2026-04-02T12:55:00Z
5
value 0.00914
scoring_system epss
scoring_elements 0.75857
published_at 2026-04-04T12:55:00Z
6
value 0.00914
scoring_system epss
scoring_elements 0.75836
published_at 2026-04-07T12:55:00Z
7
value 0.00914
scoring_system epss
scoring_elements 0.75869
published_at 2026-04-08T12:55:00Z
8
value 0.00914
scoring_system epss
scoring_elements 0.75882
published_at 2026-04-09T12:55:00Z
9
value 0.00914
scoring_system epss
scoring_elements 0.75905
published_at 2026-04-11T12:55:00Z
10
value 0.00914
scoring_system epss
scoring_elements 0.75886
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0775
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=831095
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=831095
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681
29
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16950
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16950
30
reference_url http://www.debian.org/security/2013/dsa-2699
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2699
31
reference_url http://www.mozilla.org/security/announce/2013/mfsa2013-26.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2013/mfsa2013-26.html
32
reference_url http://www.ubuntu.com/usn/USN-1729-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-1
33
reference_url http://www.ubuntu.com/usn/USN-1729-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-2
34
reference_url http://www.ubuntu.com/usn/USN-1748-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1748-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=911843
reference_id 911843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=911843
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0775
reference_id CVE-2013-0775
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-0775
58
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
59
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-26
reference_id mfsa2013-26
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-26
60
reference_url https://access.redhat.com/errata/RHSA-2013:0271
reference_id RHSA-2013:0271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0271
61
reference_url https://access.redhat.com/errata/RHSA-2013:0272
reference_id RHSA-2013:0272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0272
62
reference_url https://usn.ubuntu.com/1729-1/
reference_id USN-1729-1
reference_type
scores
url https://usn.ubuntu.com/1729-1/
63
reference_url https://usn.ubuntu.com/1748-1/
reference_id USN-1748-1
reference_type
scores
url https://usn.ubuntu.com/1748-1/
fixed_packages
0
url pkg:mozilla/Firefox@19.0.0
purl pkg:mozilla/Firefox@19.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@19.0.0
aliases CVE-2013-0775
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ccxh-pw22-3qes
3
url VCID-etx3-asx5-zkgd
vulnerability_id VCID-etx3-asx5-zkgd
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0271.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0271.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-0272.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0272.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0783.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0783.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0783
reference_id
reference_type
scores
0
value 0.01206
scoring_system epss
scoring_elements 0.78984
published_at 2026-04-16T12:55:00Z
1
value 0.01206
scoring_system epss
scoring_elements 0.78908
published_at 2026-04-01T12:55:00Z
2
value 0.01206
scoring_system epss
scoring_elements 0.78965
published_at 2026-04-12T12:55:00Z
3
value 0.01206
scoring_system epss
scoring_elements 0.78955
published_at 2026-04-13T12:55:00Z
4
value 0.01206
scoring_system epss
scoring_elements 0.78914
published_at 2026-04-02T12:55:00Z
5
value 0.01206
scoring_system epss
scoring_elements 0.78943
published_at 2026-04-04T12:55:00Z
6
value 0.01206
scoring_system epss
scoring_elements 0.78926
published_at 2026-04-07T12:55:00Z
7
value 0.01206
scoring_system epss
scoring_elements 0.78951
published_at 2026-04-08T12:55:00Z
8
value 0.01206
scoring_system epss
scoring_elements 0.78957
published_at 2026-04-09T12:55:00Z
9
value 0.01206
scoring_system epss
scoring_elements 0.78981
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0783
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=690970
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=690970
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=761448
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=761448
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=780549
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=780549
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=812380
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=812380
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=818241
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=818241
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=822858
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=822858
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=826471
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=826471
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=830399
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=830399
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=830975
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=830975
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=832162
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=832162
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681
38
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16219
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16219
39
reference_url http://www.debian.org/security/2013/dsa-2699
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2699
40
reference_url http://www.mozilla.org/security/announce/2013/mfsa2013-21.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2013/mfsa2013-21.html
41
reference_url http://www.ubuntu.com/usn/USN-1729-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-1
42
reference_url http://www.ubuntu.com/usn/USN-1729-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-2
43
reference_url http://www.ubuntu.com/usn/USN-1748-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1748-1
44
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=911836
reference_id 911836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=911836
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0783
reference_id CVE-2013-0783
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-0783
67
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
68
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-21
reference_id mfsa2013-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-21
69
reference_url https://access.redhat.com/errata/RHSA-2013:0271
reference_id RHSA-2013:0271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0271
70
reference_url https://access.redhat.com/errata/RHSA-2013:0272
reference_id RHSA-2013:0272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0272
71
reference_url https://usn.ubuntu.com/1729-1/
reference_id USN-1729-1
reference_type
scores
url https://usn.ubuntu.com/1729-1/
72
reference_url https://usn.ubuntu.com/1748-1/
reference_id USN-1748-1
reference_type
scores
url https://usn.ubuntu.com/1748-1/
fixed_packages
0
url pkg:mozilla/Firefox@19.0.0
purl pkg:mozilla/Firefox@19.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@19.0.0
aliases CVE-2013-0783
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-etx3-asx5-zkgd
4
url VCID-gtyn-tsvy-8ugt
vulnerability_id VCID-gtyn-tsvy-8ugt
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0765.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0765.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0765
reference_id
reference_type
scores
0
value 0.00777
scoring_system epss
scoring_elements 0.73684
published_at 2026-04-18T12:55:00Z
1
value 0.00777
scoring_system epss
scoring_elements 0.73581
published_at 2026-04-01T12:55:00Z
2
value 0.00777
scoring_system epss
scoring_elements 0.73632
published_at 2026-04-13T12:55:00Z
3
value 0.00777
scoring_system epss
scoring_elements 0.73675
published_at 2026-04-16T12:55:00Z
4
value 0.00777
scoring_system epss
scoring_elements 0.7359
published_at 2026-04-02T12:55:00Z
5
value 0.00777
scoring_system epss
scoring_elements 0.73614
published_at 2026-04-04T12:55:00Z
6
value 0.00777
scoring_system epss
scoring_elements 0.73587
published_at 2026-04-07T12:55:00Z
7
value 0.00777
scoring_system epss
scoring_elements 0.73623
published_at 2026-04-08T12:55:00Z
8
value 0.00777
scoring_system epss
scoring_elements 0.73636
published_at 2026-04-09T12:55:00Z
9
value 0.00777
scoring_system epss
scoring_elements 0.73658
published_at 2026-04-11T12:55:00Z
10
value 0.00777
scoring_system epss
scoring_elements 0.7364
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0765
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=830614
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=830614
5
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17097
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17097
6
reference_url http://www.mozilla.org/security/announce/2013/mfsa2013-23.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2013/mfsa2013-23.html
7
reference_url http://www.ubuntu.com/usn/USN-1729-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-1
8
reference_url http://www.ubuntu.com/usn/USN-1729-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-2
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=911838
reference_id 911838
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=911838
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0765
reference_id CVE-2013-0765
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0765
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0765
reference_id CVE-2013-0765
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-0765
21
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-23
reference_id mfsa2013-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-23
23
reference_url https://usn.ubuntu.com/1729-1/
reference_id USN-1729-1
reference_type
scores
url https://usn.ubuntu.com/1729-1/
fixed_packages
0
url pkg:mozilla/Firefox@19.0.0
purl pkg:mozilla/Firefox@19.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@19.0.0
aliases CVE-2013-0765
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gtyn-tsvy-8ugt
5
url VCID-t5xp-1qqf-cfht
vulnerability_id VCID-t5xp-1qqf-cfht
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1812.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1812.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0772.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0772.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0772
reference_id
reference_type
scores
0
value 0.01287
scoring_system epss
scoring_elements 0.79668
published_at 2026-04-18T12:55:00Z
1
value 0.01287
scoring_system epss
scoring_elements 0.79587
published_at 2026-04-01T12:55:00Z
2
value 0.01287
scoring_system epss
scoring_elements 0.79645
published_at 2026-04-12T12:55:00Z
3
value 0.01287
scoring_system epss
scoring_elements 0.79637
published_at 2026-04-13T12:55:00Z
4
value 0.01287
scoring_system epss
scoring_elements 0.79594
published_at 2026-04-02T12:55:00Z
5
value 0.01287
scoring_system epss
scoring_elements 0.79617
published_at 2026-04-04T12:55:00Z
6
value 0.01287
scoring_system epss
scoring_elements 0.79603
published_at 2026-04-07T12:55:00Z
7
value 0.01287
scoring_system epss
scoring_elements 0.79632
published_at 2026-04-08T12:55:00Z
8
value 0.01287
scoring_system epss
scoring_elements 0.7964
published_at 2026-04-09T12:55:00Z
9
value 0.01287
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0772
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=801366
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=801366
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17159
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17159
7
reference_url http://www.mozilla.org/security/announce/2013/mfsa2013-22.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2013/mfsa2013-22.html
8
reference_url http://www.ubuntu.com/usn/USN-1729-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-1
9
reference_url http://www.ubuntu.com/usn/USN-1729-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-2
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=911840
reference_id 911840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=911840
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772
reference_id CVE-2013-0772
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0772
reference_id CVE-2013-0772
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0772
31
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
32
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-22
reference_id mfsa2013-22
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-22
33
reference_url https://access.redhat.com/errata/RHSA-2013:1812
reference_id RHSA-2013:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1812
34
reference_url https://access.redhat.com/errata/RHSA-2013:1823
reference_id RHSA-2013:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1823
35
reference_url https://usn.ubuntu.com/1729-1/
reference_id USN-1729-1
reference_type
scores
url https://usn.ubuntu.com/1729-1/
fixed_packages
0
url pkg:mozilla/Firefox@19.0.0
purl pkg:mozilla/Firefox@19.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@19.0.0
aliases CVE-2013-0772
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5xp-1qqf-cfht
6
url VCID-upug-h4bk-fyfj
vulnerability_id VCID-upug-h4bk-fyfj
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0271.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0271.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-0272.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0272.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0780.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0780.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0780
reference_id
reference_type
scores
0
value 0.02146
scoring_system epss
scoring_elements 0.8425
published_at 2026-04-18T12:55:00Z
1
value 0.02146
scoring_system epss
scoring_elements 0.84157
published_at 2026-04-01T12:55:00Z
2
value 0.02146
scoring_system epss
scoring_elements 0.84227
published_at 2026-04-13T12:55:00Z
3
value 0.02146
scoring_system epss
scoring_elements 0.84249
published_at 2026-04-16T12:55:00Z
4
value 0.02146
scoring_system epss
scoring_elements 0.84171
published_at 2026-04-02T12:55:00Z
5
value 0.02146
scoring_system epss
scoring_elements 0.84189
published_at 2026-04-04T12:55:00Z
6
value 0.02146
scoring_system epss
scoring_elements 0.84191
published_at 2026-04-07T12:55:00Z
7
value 0.02146
scoring_system epss
scoring_elements 0.84212
published_at 2026-04-08T12:55:00Z
8
value 0.02146
scoring_system epss
scoring_elements 0.84218
published_at 2026-04-09T12:55:00Z
9
value 0.02146
scoring_system epss
scoring_elements 0.84236
published_at 2026-04-11T12:55:00Z
10
value 0.02146
scoring_system epss
scoring_elements 0.8423
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0780
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=812893
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=812893
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681
29
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16383
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16383
30
reference_url http://www.debian.org/security/2013/dsa-2699
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2699
31
reference_url http://www.mozilla.org/security/announce/2013/mfsa2013-28.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2013/mfsa2013-28.html
32
reference_url http://www.ubuntu.com/usn/USN-1729-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-1
33
reference_url http://www.ubuntu.com/usn/USN-1729-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-2
34
reference_url http://www.ubuntu.com/usn/USN-1748-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1748-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=911865
reference_id 911865
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=911865
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0780
reference_id CVE-2013-0780
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-0780
58
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
59
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-28
reference_id mfsa2013-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-28
60
reference_url https://access.redhat.com/errata/RHSA-2013:0271
reference_id RHSA-2013:0271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0271
61
reference_url https://access.redhat.com/errata/RHSA-2013:0272
reference_id RHSA-2013:0272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0272
62
reference_url https://usn.ubuntu.com/1729-1/
reference_id USN-1729-1
reference_type
scores
url https://usn.ubuntu.com/1729-1/
63
reference_url https://usn.ubuntu.com/1748-1/
reference_id USN-1748-1
reference_type
scores
url https://usn.ubuntu.com/1748-1/
fixed_packages
0
url pkg:mozilla/Firefox@19.0.0
purl pkg:mozilla/Firefox@19.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@19.0.0
aliases CVE-2013-0780
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upug-h4bk-fyfj
7
url VCID-w46a-296b-dqgm
vulnerability_id VCID-w46a-296b-dqgm
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0773.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0773.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0773
reference_id
reference_type
scores
0
value 0.01519
scoring_system epss
scoring_elements 0.8128
published_at 2026-04-18T12:55:00Z
1
value 0.01519
scoring_system epss
scoring_elements 0.81178
published_at 2026-04-01T12:55:00Z
2
value 0.01519
scoring_system epss
scoring_elements 0.81242
published_at 2026-04-13T12:55:00Z
3
value 0.01519
scoring_system epss
scoring_elements 0.81278
published_at 2026-04-16T12:55:00Z
4
value 0.01519
scoring_system epss
scoring_elements 0.81187
published_at 2026-04-02T12:55:00Z
5
value 0.01519
scoring_system epss
scoring_elements 0.8121
published_at 2026-04-07T12:55:00Z
6
value 0.01519
scoring_system epss
scoring_elements 0.81238
published_at 2026-04-08T12:55:00Z
7
value 0.01519
scoring_system epss
scoring_elements 0.81243
published_at 2026-04-09T12:55:00Z
8
value 0.01519
scoring_system epss
scoring_elements 0.81263
published_at 2026-04-11T12:55:00Z
9
value 0.01519
scoring_system epss
scoring_elements 0.81249
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0773
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=809652
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=809652
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16861
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16861
28
reference_url http://www.debian.org/security/2013/dsa-2699
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2699
29
reference_url http://www.mozilla.org/security/announce/2013/mfsa2013-24.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2013/mfsa2013-24.html
30
reference_url http://www.ubuntu.com/usn/USN-1729-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-1
31
reference_url http://www.ubuntu.com/usn/USN-1729-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1729-2
32
reference_url http://www.ubuntu.com/usn/USN-1748-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1748-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=911839
reference_id 911839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=911839
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0773
reference_id CVE-2013-0773
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-0773
47
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
48
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-24
reference_id mfsa2013-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-24
49
reference_url https://usn.ubuntu.com/1729-1/
reference_id USN-1729-1
reference_type
scores
url https://usn.ubuntu.com/1729-1/
50
reference_url https://usn.ubuntu.com/1748-1/
reference_id USN-1748-1
reference_type
scores
url https://usn.ubuntu.com/1748-1/
fixed_packages
0
url pkg:mozilla/Firefox@19.0.0
purl pkg:mozilla/Firefox@19.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@19.0.0
aliases CVE-2013-0773
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w46a-296b-dqgm
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@19.0.0