Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/Seamonkey@2.21.0
Typemozilla
Namespace
NameSeamonkey
Version2.21.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.22.0
Latest_non_vulnerable_version2.31.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1wj7-7cne-hugr
vulnerability_id VCID-1wj7-7cne-hugr
summary
Security researcher Alex Chapman reported that the Almost
Native Graphics Layer Engine (ANGLE) library used by Mozilla is vulnerable to an
integer overflow. This vulnerability is present because of insufficient bounds
checking in the drawLineLoop function, which can be driven by web
content to overflow allocated memory, leading to a potentially exploitable
crash.
In general this flaw cannot be exploited through email in the
Thunderbird product because scripting is disabled, but is potentially a risk in
browser or browser-like contexts.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1721.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1721
reference_id
reference_type
scores
0
value 0.00889
scoring_system epss
scoring_elements 0.75556
published_at 2026-04-16T12:55:00Z
1
value 0.00889
scoring_system epss
scoring_elements 0.75459
published_at 2026-04-01T12:55:00Z
2
value 0.00889
scoring_system epss
scoring_elements 0.75462
published_at 2026-04-02T12:55:00Z
3
value 0.00889
scoring_system epss
scoring_elements 0.75493
published_at 2026-04-04T12:55:00Z
4
value 0.00889
scoring_system epss
scoring_elements 0.75473
published_at 2026-04-07T12:55:00Z
5
value 0.00889
scoring_system epss
scoring_elements 0.75516
published_at 2026-04-08T12:55:00Z
6
value 0.00889
scoring_system epss
scoring_elements 0.75525
published_at 2026-04-09T12:55:00Z
7
value 0.00889
scoring_system epss
scoring_elements 0.75545
published_at 2026-04-11T12:55:00Z
8
value 0.00889
scoring_system epss
scoring_elements 0.75523
published_at 2026-04-12T12:55:00Z
9
value 0.00889
scoring_system epss
scoring_elements 0.75514
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1721
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009213
reference_id 1009213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009213
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1721
reference_id CVE-2013-1721
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1721
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-78
reference_id mfsa2013-78
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-78
5
reference_url https://usn.ubuntu.com/1951-1/
reference_id USN-1951-1
reference_type
scores
url https://usn.ubuntu.com/1951-1/
6
reference_url https://usn.ubuntu.com/1952-1/
reference_id USN-1952-1
reference_type
scores
url https://usn.ubuntu.com/1952-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1721
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1wj7-7cne-hugr
1
url VCID-2stf-rr9y-d3d1
vulnerability_id VCID-2stf-rr9y-d3d1
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1718.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1718.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1718
reference_id
reference_type
scores
0
value 0.01556
scoring_system epss
scoring_elements 0.81485
published_at 2026-04-16T12:55:00Z
1
value 0.01556
scoring_system epss
scoring_elements 0.81382
published_at 2026-04-01T12:55:00Z
2
value 0.01556
scoring_system epss
scoring_elements 0.81391
published_at 2026-04-02T12:55:00Z
3
value 0.01556
scoring_system epss
scoring_elements 0.81414
published_at 2026-04-04T12:55:00Z
4
value 0.01556
scoring_system epss
scoring_elements 0.81413
published_at 2026-04-07T12:55:00Z
5
value 0.01556
scoring_system epss
scoring_elements 0.81441
published_at 2026-04-08T12:55:00Z
6
value 0.01556
scoring_system epss
scoring_elements 0.81446
published_at 2026-04-09T12:55:00Z
7
value 0.01556
scoring_system epss
scoring_elements 0.81468
published_at 2026-04-11T12:55:00Z
8
value 0.01556
scoring_system epss
scoring_elements 0.81455
published_at 2026-04-12T12:55:00Z
9
value 0.01556
scoring_system epss
scoring_elements 0.81449
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1718
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009031
reference_id 1009031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009031
11
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-76
reference_id mfsa2013-76
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-76
13
reference_url https://access.redhat.com/errata/RHSA-2013:1268
reference_id RHSA-2013:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1268
14
reference_url https://access.redhat.com/errata/RHSA-2013:1269
reference_id RHSA-2013:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1269
15
reference_url https://usn.ubuntu.com/1951-1/
reference_id USN-1951-1
reference_type
scores
url https://usn.ubuntu.com/1951-1/
16
reference_url https://usn.ubuntu.com/1952-1/
reference_id USN-1952-1
reference_type
scores
url https://usn.ubuntu.com/1952-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1718
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2stf-rr9y-d3d1
2
url VCID-4mu8-e76c-kyeh
vulnerability_id VCID-4mu8-e76c-kyeh
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1723.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1723.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1723
reference_id
reference_type
scores
0
value 0.01795
scoring_system epss
scoring_elements 0.82799
published_at 2026-04-16T12:55:00Z
1
value 0.01795
scoring_system epss
scoring_elements 0.82695
published_at 2026-04-01T12:55:00Z
2
value 0.01795
scoring_system epss
scoring_elements 0.82712
published_at 2026-04-02T12:55:00Z
3
value 0.01795
scoring_system epss
scoring_elements 0.82724
published_at 2026-04-04T12:55:00Z
4
value 0.01795
scoring_system epss
scoring_elements 0.82721
published_at 2026-04-07T12:55:00Z
5
value 0.01795
scoring_system epss
scoring_elements 0.82747
published_at 2026-04-08T12:55:00Z
6
value 0.01795
scoring_system epss
scoring_elements 0.82754
published_at 2026-04-09T12:55:00Z
7
value 0.01795
scoring_system epss
scoring_elements 0.8277
published_at 2026-04-11T12:55:00Z
8
value 0.01795
scoring_system epss
scoring_elements 0.82764
published_at 2026-04-12T12:55:00Z
9
value 0.01795
scoring_system epss
scoring_elements 0.8276
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1723
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009214
reference_id 1009214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009214
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1723
reference_id CVE-2013-1723
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1723
4
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-80
reference_id mfsa2013-80
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-80
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1723
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4mu8-e76c-kyeh
3
url VCID-9c5k-2ftn-gqbg
vulnerability_id VCID-9c5k-2ftn-gqbg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1732.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1732.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1732
reference_id
reference_type
scores
0
value 0.33161
scoring_system epss
scoring_elements 0.96909
published_at 2026-04-16T12:55:00Z
1
value 0.33161
scoring_system epss
scoring_elements 0.96871
published_at 2026-04-01T12:55:00Z
2
value 0.33161
scoring_system epss
scoring_elements 0.96878
published_at 2026-04-02T12:55:00Z
3
value 0.33161
scoring_system epss
scoring_elements 0.96883
published_at 2026-04-04T12:55:00Z
4
value 0.33161
scoring_system epss
scoring_elements 0.96888
published_at 2026-04-07T12:55:00Z
5
value 0.33161
scoring_system epss
scoring_elements 0.96896
published_at 2026-04-08T12:55:00Z
6
value 0.33161
scoring_system epss
scoring_elements 0.96897
published_at 2026-04-09T12:55:00Z
7
value 0.33161
scoring_system epss
scoring_elements 0.969
published_at 2026-04-11T12:55:00Z
8
value 0.33161
scoring_system epss
scoring_elements 0.96901
published_at 2026-04-12T12:55:00Z
9
value 0.33161
scoring_system epss
scoring_elements 0.96902
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1732
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009037
reference_id 1009037
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009037
11
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-89
reference_id mfsa2013-89
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-89
13
reference_url https://access.redhat.com/errata/RHSA-2013:1268
reference_id RHSA-2013:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1268
14
reference_url https://access.redhat.com/errata/RHSA-2013:1269
reference_id RHSA-2013:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1269
15
reference_url https://usn.ubuntu.com/1951-1/
reference_id USN-1951-1
reference_type
scores
url https://usn.ubuntu.com/1951-1/
16
reference_url https://usn.ubuntu.com/1952-1/
reference_id USN-1952-1
reference_type
scores
url https://usn.ubuntu.com/1952-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1732
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9c5k-2ftn-gqbg
4
url VCID-b5rm-htak-byga
vulnerability_id VCID-b5rm-htak-byga
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1730.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1730
reference_id
reference_type
scores
0
value 0.00729
scoring_system epss
scoring_elements 0.72675
published_at 2026-04-16T12:55:00Z
1
value 0.00729
scoring_system epss
scoring_elements 0.72587
published_at 2026-04-01T12:55:00Z
2
value 0.00729
scoring_system epss
scoring_elements 0.72595
published_at 2026-04-02T12:55:00Z
3
value 0.00729
scoring_system epss
scoring_elements 0.72611
published_at 2026-04-04T12:55:00Z
4
value 0.00729
scoring_system epss
scoring_elements 0.72588
published_at 2026-04-07T12:55:00Z
5
value 0.00729
scoring_system epss
scoring_elements 0.72627
published_at 2026-04-08T12:55:00Z
6
value 0.00729
scoring_system epss
scoring_elements 0.72639
published_at 2026-04-09T12:55:00Z
7
value 0.00729
scoring_system epss
scoring_elements 0.72661
published_at 2026-04-11T12:55:00Z
8
value 0.00729
scoring_system epss
scoring_elements 0.72644
published_at 2026-04-12T12:55:00Z
9
value 0.00729
scoring_system epss
scoring_elements 0.72634
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009036
reference_id 1009036
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009036
11
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-88
reference_id mfsa2013-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-88
13
reference_url https://access.redhat.com/errata/RHSA-2013:1268
reference_id RHSA-2013:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1268
14
reference_url https://access.redhat.com/errata/RHSA-2013:1269
reference_id RHSA-2013:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1269
15
reference_url https://usn.ubuntu.com/1951-1/
reference_id USN-1951-1
reference_type
scores
url https://usn.ubuntu.com/1951-1/
16
reference_url https://usn.ubuntu.com/1952-1/
reference_id USN-1952-1
reference_type
scores
url https://usn.ubuntu.com/1952-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1730
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b5rm-htak-byga
5
url VCID-bdbv-4v22-27gs
vulnerability_id VCID-bdbv-4v22-27gs
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1726
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.28872
published_at 2026-04-16T12:55:00Z
1
value 0.00107
scoring_system epss
scoring_elements 0.28899
published_at 2026-04-01T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.28974
published_at 2026-04-02T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.29024
published_at 2026-04-04T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28831
published_at 2026-04-07T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.28898
published_at 2026-04-08T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.28939
published_at 2026-04-09T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.28943
published_at 2026-04-11T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.289
published_at 2026-04-12T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.2885
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1726
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726
reference_id CVE-2013-1726
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726
2
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-83
reference_id mfsa2013-83
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-83
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1726
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdbv-4v22-27gs
6
url VCID-h2ba-gpbd-fqfd
vulnerability_id VCID-h2ba-gpbd-fqfd
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1735.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1735.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1735
reference_id
reference_type
scores
0
value 0.04502
scoring_system epss
scoring_elements 0.89144
published_at 2026-04-16T12:55:00Z
1
value 0.04502
scoring_system epss
scoring_elements 0.89076
published_at 2026-04-01T12:55:00Z
2
value 0.04502
scoring_system epss
scoring_elements 0.89085
published_at 2026-04-02T12:55:00Z
3
value 0.04502
scoring_system epss
scoring_elements 0.891
published_at 2026-04-04T12:55:00Z
4
value 0.04502
scoring_system epss
scoring_elements 0.89103
published_at 2026-04-07T12:55:00Z
5
value 0.04502
scoring_system epss
scoring_elements 0.8912
published_at 2026-04-08T12:55:00Z
6
value 0.04502
scoring_system epss
scoring_elements 0.89126
published_at 2026-04-09T12:55:00Z
7
value 0.04502
scoring_system epss
scoring_elements 0.89136
published_at 2026-04-11T12:55:00Z
8
value 0.04502
scoring_system epss
scoring_elements 0.89133
published_at 2026-04-12T12:55:00Z
9
value 0.04502
scoring_system epss
scoring_elements 0.89131
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1735
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009039
reference_id 1009039
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009039
11
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-90
reference_id mfsa2013-90
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-90
13
reference_url https://access.redhat.com/errata/RHSA-2013:1268
reference_id RHSA-2013:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1268
14
reference_url https://access.redhat.com/errata/RHSA-2013:1269
reference_id RHSA-2013:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1269
15
reference_url https://usn.ubuntu.com/1951-1/
reference_id USN-1951-1
reference_type
scores
url https://usn.ubuntu.com/1951-1/
16
reference_url https://usn.ubuntu.com/1952-1/
reference_id USN-1952-1
reference_type
scores
url https://usn.ubuntu.com/1952-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1735
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2ba-gpbd-fqfd
7
url VCID-kb3u-p728-83en
vulnerability_id VCID-kb3u-p728-83en
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1724.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1724.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1724
reference_id
reference_type
scores
0
value 0.04345
scoring_system epss
scoring_elements 0.88951
published_at 2026-04-16T12:55:00Z
1
value 0.04345
scoring_system epss
scoring_elements 0.88883
published_at 2026-04-01T12:55:00Z
2
value 0.04345
scoring_system epss
scoring_elements 0.88891
published_at 2026-04-02T12:55:00Z
3
value 0.04345
scoring_system epss
scoring_elements 0.88906
published_at 2026-04-04T12:55:00Z
4
value 0.04345
scoring_system epss
scoring_elements 0.88908
published_at 2026-04-07T12:55:00Z
5
value 0.04345
scoring_system epss
scoring_elements 0.88927
published_at 2026-04-08T12:55:00Z
6
value 0.04345
scoring_system epss
scoring_elements 0.88932
published_at 2026-04-09T12:55:00Z
7
value 0.04345
scoring_system epss
scoring_elements 0.88943
published_at 2026-04-11T12:55:00Z
8
value 0.04345
scoring_system epss
scoring_elements 0.88938
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1724
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009216
reference_id 1009216
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009216
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1724
reference_id CVE-2013-1724
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1724
4
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-81
reference_id mfsa2013-81
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-81
6
reference_url https://usn.ubuntu.com/1951-1/
reference_id USN-1951-1
reference_type
scores
url https://usn.ubuntu.com/1951-1/
7
reference_url https://usn.ubuntu.com/1952-1/
reference_id USN-1952-1
reference_type
scores
url https://usn.ubuntu.com/1952-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1724
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kb3u-p728-83en
8
url VCID-nfqd-hm51-mbbd
vulnerability_id VCID-nfqd-hm51-mbbd
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1725.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1725.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1725
reference_id
reference_type
scores
0
value 0.02856
scoring_system epss
scoring_elements 0.86257
published_at 2026-04-16T12:55:00Z
1
value 0.02856
scoring_system epss
scoring_elements 0.86178
published_at 2026-04-01T12:55:00Z
2
value 0.02856
scoring_system epss
scoring_elements 0.86188
published_at 2026-04-02T12:55:00Z
3
value 0.02856
scoring_system epss
scoring_elements 0.86201
published_at 2026-04-04T12:55:00Z
4
value 0.02856
scoring_system epss
scoring_elements 0.86202
published_at 2026-04-07T12:55:00Z
5
value 0.02856
scoring_system epss
scoring_elements 0.86221
published_at 2026-04-08T12:55:00Z
6
value 0.02856
scoring_system epss
scoring_elements 0.86232
published_at 2026-04-09T12:55:00Z
7
value 0.02856
scoring_system epss
scoring_elements 0.86246
published_at 2026-04-11T12:55:00Z
8
value 0.02856
scoring_system epss
scoring_elements 0.86244
published_at 2026-04-12T12:55:00Z
9
value 0.02856
scoring_system epss
scoring_elements 0.8624
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1725
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009033
reference_id 1009033
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009033
11
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-82
reference_id mfsa2013-82
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-82
13
reference_url https://access.redhat.com/errata/RHSA-2013:1268
reference_id RHSA-2013:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1268
14
reference_url https://access.redhat.com/errata/RHSA-2013:1269
reference_id RHSA-2013:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1269
15
reference_url https://usn.ubuntu.com/1951-1/
reference_id USN-1951-1
reference_type
scores
url https://usn.ubuntu.com/1951-1/
16
reference_url https://usn.ubuntu.com/1952-1/
reference_id USN-1952-1
reference_type
scores
url https://usn.ubuntu.com/1952-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1725
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nfqd-hm51-mbbd
9
url VCID-nn8u-pnsy-3ff4
vulnerability_id VCID-nn8u-pnsy-3ff4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1722.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1722
reference_id
reference_type
scores
0
value 0.03865
scoring_system epss
scoring_elements 0.88235
published_at 2026-04-16T12:55:00Z
1
value 0.03865
scoring_system epss
scoring_elements 0.88163
published_at 2026-04-01T12:55:00Z
2
value 0.03865
scoring_system epss
scoring_elements 0.88171
published_at 2026-04-02T12:55:00Z
3
value 0.03865
scoring_system epss
scoring_elements 0.88187
published_at 2026-04-04T12:55:00Z
4
value 0.03865
scoring_system epss
scoring_elements 0.88193
published_at 2026-04-07T12:55:00Z
5
value 0.03865
scoring_system epss
scoring_elements 0.88212
published_at 2026-04-08T12:55:00Z
6
value 0.03865
scoring_system epss
scoring_elements 0.88218
published_at 2026-04-09T12:55:00Z
7
value 0.03865
scoring_system epss
scoring_elements 0.88229
published_at 2026-04-11T12:55:00Z
8
value 0.03865
scoring_system epss
scoring_elements 0.88222
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1722
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009032
reference_id 1009032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009032
11
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-79
reference_id mfsa2013-79
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-79
13
reference_url https://access.redhat.com/errata/RHSA-2013:1268
reference_id RHSA-2013:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1268
14
reference_url https://access.redhat.com/errata/RHSA-2013:1269
reference_id RHSA-2013:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1269
15
reference_url https://usn.ubuntu.com/1951-1/
reference_id USN-1951-1
reference_type
scores
url https://usn.ubuntu.com/1951-1/
16
reference_url https://usn.ubuntu.com/1952-1/
reference_id USN-1952-1
reference_type
scores
url https://usn.ubuntu.com/1952-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1722
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nn8u-pnsy-3ff4
10
url VCID-r6cj-4sj2-fyfc
vulnerability_id VCID-r6cj-4sj2-fyfc
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1738.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1738.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1738
reference_id
reference_type
scores
0
value 0.04616
scoring_system epss
scoring_elements 0.89276
published_at 2026-04-16T12:55:00Z
1
value 0.04616
scoring_system epss
scoring_elements 0.89215
published_at 2026-04-01T12:55:00Z
2
value 0.04616
scoring_system epss
scoring_elements 0.89221
published_at 2026-04-02T12:55:00Z
3
value 0.04616
scoring_system epss
scoring_elements 0.89236
published_at 2026-04-04T12:55:00Z
4
value 0.04616
scoring_system epss
scoring_elements 0.89238
published_at 2026-04-07T12:55:00Z
5
value 0.04616
scoring_system epss
scoring_elements 0.89256
published_at 2026-04-08T12:55:00Z
6
value 0.04616
scoring_system epss
scoring_elements 0.89261
published_at 2026-04-09T12:55:00Z
7
value 0.04616
scoring_system epss
scoring_elements 0.8927
published_at 2026-04-11T12:55:00Z
8
value 0.04616
scoring_system epss
scoring_elements 0.89266
published_at 2026-04-12T12:55:00Z
9
value 0.04616
scoring_system epss
scoring_elements 0.89263
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1738
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009219
reference_id 1009219
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009219
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1738
reference_id CVE-2013-1738
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1738
4
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-92
reference_id mfsa2013-92
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-92
6
reference_url https://usn.ubuntu.com/1951-1/
reference_id USN-1951-1
reference_type
scores
url https://usn.ubuntu.com/1951-1/
7
reference_url https://usn.ubuntu.com/1952-1/
reference_id USN-1952-1
reference_type
scores
url https://usn.ubuntu.com/1952-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1738
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r6cj-4sj2-fyfc
11
url VCID-s1xx-mnsy-4bbm
vulnerability_id VCID-s1xx-mnsy-4bbm
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1720.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1720.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1720
reference_id
reference_type
scores
0
value 0.02687
scoring_system epss
scoring_elements 0.85874
published_at 2026-04-16T12:55:00Z
1
value 0.02687
scoring_system epss
scoring_elements 0.85783
published_at 2026-04-01T12:55:00Z
2
value 0.02687
scoring_system epss
scoring_elements 0.85796
published_at 2026-04-02T12:55:00Z
3
value 0.02687
scoring_system epss
scoring_elements 0.85814
published_at 2026-04-04T12:55:00Z
4
value 0.02687
scoring_system epss
scoring_elements 0.85819
published_at 2026-04-07T12:55:00Z
5
value 0.02687
scoring_system epss
scoring_elements 0.85837
published_at 2026-04-08T12:55:00Z
6
value 0.02687
scoring_system epss
scoring_elements 0.85847
published_at 2026-04-09T12:55:00Z
7
value 0.02687
scoring_system epss
scoring_elements 0.85862
published_at 2026-04-11T12:55:00Z
8
value 0.02687
scoring_system epss
scoring_elements 0.8586
published_at 2026-04-12T12:55:00Z
9
value 0.02687
scoring_system epss
scoring_elements 0.85855
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1720
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009212
reference_id 1009212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009212
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1720
reference_id CVE-2013-1720
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1720
4
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-77
reference_id mfsa2013-77
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-77
6
reference_url https://usn.ubuntu.com/1951-1/
reference_id USN-1951-1
reference_type
scores
url https://usn.ubuntu.com/1951-1/
7
reference_url https://usn.ubuntu.com/1952-1/
reference_id USN-1952-1
reference_type
scores
url https://usn.ubuntu.com/1952-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1720
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s1xx-mnsy-4bbm
12
url VCID-t5pz-h3w5-rbe6
vulnerability_id VCID-t5pz-h3w5-rbe6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1728.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1728.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1728
reference_id
reference_type
scores
0
value 0.01072
scoring_system epss
scoring_elements 0.77783
published_at 2026-04-16T12:55:00Z
1
value 0.01072
scoring_system epss
scoring_elements 0.77687
published_at 2026-04-01T12:55:00Z
2
value 0.01072
scoring_system epss
scoring_elements 0.77694
published_at 2026-04-02T12:55:00Z
3
value 0.01072
scoring_system epss
scoring_elements 0.77721
published_at 2026-04-04T12:55:00Z
4
value 0.01072
scoring_system epss
scoring_elements 0.77704
published_at 2026-04-07T12:55:00Z
5
value 0.01072
scoring_system epss
scoring_elements 0.77732
published_at 2026-04-08T12:55:00Z
6
value 0.01072
scoring_system epss
scoring_elements 0.77737
published_at 2026-04-09T12:55:00Z
7
value 0.01072
scoring_system epss
scoring_elements 0.77763
published_at 2026-04-11T12:55:00Z
8
value 0.01072
scoring_system epss
scoring_elements 0.77747
published_at 2026-04-12T12:55:00Z
9
value 0.01072
scoring_system epss
scoring_elements 0.77746
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1728
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009217
reference_id 1009217
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009217
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1728
reference_id CVE-2013-1728
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1728
4
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-85
reference_id mfsa2013-85
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-85
6
reference_url https://usn.ubuntu.com/1951-1/
reference_id USN-1951-1
reference_type
scores
url https://usn.ubuntu.com/1951-1/
7
reference_url https://usn.ubuntu.com/1952-1/
reference_id USN-1952-1
reference_type
scores
url https://usn.ubuntu.com/1952-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1728
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5pz-h3w5-rbe6
13
url VCID-v49v-hsce-audp
vulnerability_id VCID-v49v-hsce-audp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1737.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1737.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1737
reference_id
reference_type
scores
0
value 0.00418
scoring_system epss
scoring_elements 0.61834
published_at 2026-04-16T12:55:00Z
1
value 0.00418
scoring_system epss
scoring_elements 0.61664
published_at 2026-04-01T12:55:00Z
2
value 0.00418
scoring_system epss
scoring_elements 0.61739
published_at 2026-04-02T12:55:00Z
3
value 0.00418
scoring_system epss
scoring_elements 0.61768
published_at 2026-04-04T12:55:00Z
4
value 0.00418
scoring_system epss
scoring_elements 0.61738
published_at 2026-04-07T12:55:00Z
5
value 0.00418
scoring_system epss
scoring_elements 0.61787
published_at 2026-04-08T12:55:00Z
6
value 0.00418
scoring_system epss
scoring_elements 0.61802
published_at 2026-04-09T12:55:00Z
7
value 0.00418
scoring_system epss
scoring_elements 0.61823
published_at 2026-04-11T12:55:00Z
8
value 0.00418
scoring_system epss
scoring_elements 0.6181
published_at 2026-04-12T12:55:00Z
9
value 0.00418
scoring_system epss
scoring_elements 0.61791
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1737
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009041
reference_id 1009041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009041
11
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-91
reference_id mfsa2013-91
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-91
13
reference_url https://access.redhat.com/errata/RHSA-2013:1268
reference_id RHSA-2013:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1268
14
reference_url https://access.redhat.com/errata/RHSA-2013:1269
reference_id RHSA-2013:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1269
15
reference_url https://usn.ubuntu.com/1951-1/
reference_id USN-1951-1
reference_type
scores
url https://usn.ubuntu.com/1951-1/
16
reference_url https://usn.ubuntu.com/1952-1/
reference_id USN-1952-1
reference_type
scores
url https://usn.ubuntu.com/1952-1/
fixed_packages
0
url pkg:mozilla/Seamonkey@2.21.0
purl pkg:mozilla/Seamonkey@2.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0
aliases CVE-2013-1737
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v49v-hsce-audp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0