Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/Thunderbird%20ESR@10.0.6
Typemozilla
Namespace
NameThunderbird ESR
Version10.0.6
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version10.0.7
Latest_non_vulnerable_version17.0.11
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5ck6-ca4e-yqdc
vulnerability_id VCID-5ck6-ca4e-yqdc
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1967.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1967.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1967
reference_id
reference_type
scores
0
value 0.03399
scoring_system epss
scoring_elements 0.87432
published_at 2026-04-18T12:55:00Z
1
value 0.03399
scoring_system epss
scoring_elements 0.87362
published_at 2026-04-01T12:55:00Z
2
value 0.03399
scoring_system epss
scoring_elements 0.87372
published_at 2026-04-02T12:55:00Z
3
value 0.03399
scoring_system epss
scoring_elements 0.87387
published_at 2026-04-04T12:55:00Z
4
value 0.03399
scoring_system epss
scoring_elements 0.87386
published_at 2026-04-07T12:55:00Z
5
value 0.03399
scoring_system epss
scoring_elements 0.87405
published_at 2026-04-08T12:55:00Z
6
value 0.03399
scoring_system epss
scoring_elements 0.87412
published_at 2026-04-09T12:55:00Z
7
value 0.03399
scoring_system epss
scoring_elements 0.87424
published_at 2026-04-11T12:55:00Z
8
value 0.03399
scoring_system epss
scoring_elements 0.8742
published_at 2026-04-12T12:55:00Z
9
value 0.03399
scoring_system epss
scoring_elements 0.87416
published_at 2026-04-13T12:55:00Z
10
value 0.03399
scoring_system epss
scoring_elements 0.8743
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1967
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=840259
reference_id 840259
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=840259
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967
reference_id CVE-2012-1967
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-56
reference_id mfsa2012-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-56
6
reference_url https://access.redhat.com/errata/RHSA-2012:1088
reference_id RHSA-2012:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1088
7
reference_url https://access.redhat.com/errata/RHSA-2012:1089
reference_id RHSA-2012:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1089
8
reference_url https://usn.ubuntu.com/1509-1/
reference_id USN-1509-1
reference_type
scores
url https://usn.ubuntu.com/1509-1/
9
reference_url https://usn.ubuntu.com/1510-1/
reference_id USN-1510-1
reference_type
scores
url https://usn.ubuntu.com/1510-1/
fixed_packages
0
url pkg:mozilla/Thunderbird%20ESR@10.0.6
purl pkg:mozilla/Thunderbird%20ESR@10.0.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6
aliases CVE-2012-1967
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ck6-ca4e-yqdc
1
url VCID-63n5-1xtt-9fgb
vulnerability_id VCID-63n5-1xtt-9fgb
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1951.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1951.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1951
reference_id
reference_type
scores
0
value 0.03397
scoring_system epss
scoring_elements 0.8743
published_at 2026-04-18T12:55:00Z
1
value 0.03397
scoring_system epss
scoring_elements 0.87359
published_at 2026-04-01T12:55:00Z
2
value 0.03397
scoring_system epss
scoring_elements 0.87369
published_at 2026-04-02T12:55:00Z
3
value 0.03397
scoring_system epss
scoring_elements 0.87384
published_at 2026-04-07T12:55:00Z
4
value 0.03397
scoring_system epss
scoring_elements 0.87402
published_at 2026-04-08T12:55:00Z
5
value 0.03397
scoring_system epss
scoring_elements 0.87409
published_at 2026-04-09T12:55:00Z
6
value 0.03397
scoring_system epss
scoring_elements 0.87422
published_at 2026-04-11T12:55:00Z
7
value 0.03397
scoring_system epss
scoring_elements 0.87417
published_at 2026-04-12T12:55:00Z
8
value 0.03397
scoring_system epss
scoring_elements 0.87413
published_at 2026-04-13T12:55:00Z
9
value 0.03397
scoring_system epss
scoring_elements 0.87427
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1951
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=840205
reference_id 840205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=840205
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951
reference_id CVE-2012-1951
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-44
reference_id mfsa2012-44
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-44
6
reference_url https://access.redhat.com/errata/RHSA-2012:1088
reference_id RHSA-2012:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1088
7
reference_url https://access.redhat.com/errata/RHSA-2012:1089
reference_id RHSA-2012:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1089
8
reference_url https://usn.ubuntu.com/1509-1/
reference_id USN-1509-1
reference_type
scores
url https://usn.ubuntu.com/1509-1/
9
reference_url https://usn.ubuntu.com/1510-1/
reference_id USN-1510-1
reference_type
scores
url https://usn.ubuntu.com/1510-1/
fixed_packages
0
url pkg:mozilla/Thunderbird%20ESR@10.0.6
purl pkg:mozilla/Thunderbird%20ESR@10.0.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6
aliases CVE-2012-1951
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63n5-1xtt-9fgb
2
url VCID-7a5f-gu1y-ckhk
vulnerability_id VCID-7a5f-gu1y-ckhk
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1959.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1959.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1959
reference_id
reference_type
scores
0
value 0.0093
scoring_system epss
scoring_elements 0.76138
published_at 2026-04-18T12:55:00Z
1
value 0.0093
scoring_system epss
scoring_elements 0.76032
published_at 2026-04-01T12:55:00Z
2
value 0.0093
scoring_system epss
scoring_elements 0.76034
published_at 2026-04-02T12:55:00Z
3
value 0.0093
scoring_system epss
scoring_elements 0.76067
published_at 2026-04-04T12:55:00Z
4
value 0.0093
scoring_system epss
scoring_elements 0.76047
published_at 2026-04-07T12:55:00Z
5
value 0.0093
scoring_system epss
scoring_elements 0.7608
published_at 2026-04-08T12:55:00Z
6
value 0.0093
scoring_system epss
scoring_elements 0.76094
published_at 2026-04-09T12:55:00Z
7
value 0.0093
scoring_system epss
scoring_elements 0.76119
published_at 2026-04-11T12:55:00Z
8
value 0.0093
scoring_system epss
scoring_elements 0.76096
published_at 2026-04-12T12:55:00Z
9
value 0.0093
scoring_system epss
scoring_elements 0.76093
published_at 2026-04-13T12:55:00Z
10
value 0.0093
scoring_system epss
scoring_elements 0.76134
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1959
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=840212
reference_id 840212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=840212
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959
reference_id CVE-2012-1959
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-49
reference_id mfsa2012-49
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-49
6
reference_url https://access.redhat.com/errata/RHSA-2012:1088
reference_id RHSA-2012:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1088
7
reference_url https://access.redhat.com/errata/RHSA-2012:1089
reference_id RHSA-2012:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1089
8
reference_url https://usn.ubuntu.com/1509-1/
reference_id USN-1509-1
reference_type
scores
url https://usn.ubuntu.com/1509-1/
9
reference_url https://usn.ubuntu.com/1510-1/
reference_id USN-1510-1
reference_type
scores
url https://usn.ubuntu.com/1510-1/
fixed_packages
0
url pkg:mozilla/Thunderbird%20ESR@10.0.6
purl pkg:mozilla/Thunderbird%20ESR@10.0.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6
aliases CVE-2012-1959
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7a5f-gu1y-ckhk
3
url VCID-8cqv-narg-5kf1
vulnerability_id VCID-8cqv-narg-5kf1
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1949.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1949.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1949
reference_id
reference_type
scores
0
value 0.03749
scoring_system epss
scoring_elements 0.88038
published_at 2026-04-18T12:55:00Z
1
value 0.03749
scoring_system epss
scoring_elements 0.87968
published_at 2026-04-01T12:55:00Z
2
value 0.03749
scoring_system epss
scoring_elements 0.87978
published_at 2026-04-02T12:55:00Z
3
value 0.03749
scoring_system epss
scoring_elements 0.87992
published_at 2026-04-04T12:55:00Z
4
value 0.03749
scoring_system epss
scoring_elements 0.87997
published_at 2026-04-07T12:55:00Z
5
value 0.03749
scoring_system epss
scoring_elements 0.88017
published_at 2026-04-08T12:55:00Z
6
value 0.03749
scoring_system epss
scoring_elements 0.88024
published_at 2026-04-09T12:55:00Z
7
value 0.03749
scoring_system epss
scoring_elements 0.88034
published_at 2026-04-11T12:55:00Z
8
value 0.03749
scoring_system epss
scoring_elements 0.88026
published_at 2026-04-12T12:55:00Z
9
value 0.03749
scoring_system epss
scoring_elements 0.88027
published_at 2026-04-13T12:55:00Z
10
value 0.03749
scoring_system epss
scoring_elements 0.8804
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1949
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2021281
reference_id 2021281
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2021281
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1949
reference_id CVE-2012-1949
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1949
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-42
reference_id mfsa2012-42
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-42
6
reference_url https://usn.ubuntu.com/1509-1/
reference_id USN-1509-1
reference_type
scores
url https://usn.ubuntu.com/1509-1/
7
reference_url https://usn.ubuntu.com/1510-1/
reference_id USN-1510-1
reference_type
scores
url https://usn.ubuntu.com/1510-1/
fixed_packages
0
url pkg:mozilla/Thunderbird%20ESR@10.0.6
purl pkg:mozilla/Thunderbird%20ESR@10.0.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6
aliases CVE-2012-1949
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8cqv-narg-5kf1
4
url VCID-8q4m-rkhj-5fhj
vulnerability_id VCID-8q4m-rkhj-5fhj
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1964.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1964.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1964
reference_id
reference_type
scores
0
value 0.00901
scoring_system epss
scoring_elements 0.75724
published_at 2026-04-18T12:55:00Z
1
value 0.00901
scoring_system epss
scoring_elements 0.75625
published_at 2026-04-01T12:55:00Z
2
value 0.00901
scoring_system epss
scoring_elements 0.75627
published_at 2026-04-02T12:55:00Z
3
value 0.00901
scoring_system epss
scoring_elements 0.75658
published_at 2026-04-04T12:55:00Z
4
value 0.00901
scoring_system epss
scoring_elements 0.75637
published_at 2026-04-07T12:55:00Z
5
value 0.00901
scoring_system epss
scoring_elements 0.75672
published_at 2026-04-08T12:55:00Z
6
value 0.00901
scoring_system epss
scoring_elements 0.75683
published_at 2026-04-09T12:55:00Z
7
value 0.00901
scoring_system epss
scoring_elements 0.75707
published_at 2026-04-11T12:55:00Z
8
value 0.00901
scoring_system epss
scoring_elements 0.75688
published_at 2026-04-12T12:55:00Z
9
value 0.00901
scoring_system epss
scoring_elements 0.75682
published_at 2026-04-13T12:55:00Z
10
value 0.00901
scoring_system epss
scoring_elements 0.7572
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1964
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=840222
reference_id 840222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=840222
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1964
reference_id CVE-2012-1964
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1964
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-54
reference_id mfsa2012-54
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-54
6
reference_url https://access.redhat.com/errata/RHSA-2012:1088
reference_id RHSA-2012:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1088
7
reference_url https://access.redhat.com/errata/RHSA-2012:1089
reference_id RHSA-2012:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1089
8
reference_url https://usn.ubuntu.com/1509-1/
reference_id USN-1509-1
reference_type
scores
url https://usn.ubuntu.com/1509-1/
fixed_packages
0
url pkg:mozilla/Thunderbird%20ESR@10.0.6
purl pkg:mozilla/Thunderbird%20ESR@10.0.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6
aliases CVE-2012-1964
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8q4m-rkhj-5fhj
5
url VCID-9qc6-vb2t-zuh8
vulnerability_id VCID-9qc6-vb2t-zuh8
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1957.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1957.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1957
reference_id
reference_type
scores
0
value 0.00998
scoring_system epss
scoring_elements 0.77006
published_at 2026-04-18T12:55:00Z
1
value 0.00998
scoring_system epss
scoring_elements 0.76899
published_at 2026-04-01T12:55:00Z
2
value 0.00998
scoring_system epss
scoring_elements 0.76905
published_at 2026-04-02T12:55:00Z
3
value 0.00998
scoring_system epss
scoring_elements 0.76936
published_at 2026-04-04T12:55:00Z
4
value 0.00998
scoring_system epss
scoring_elements 0.76917
published_at 2026-04-07T12:55:00Z
5
value 0.00998
scoring_system epss
scoring_elements 0.7695
published_at 2026-04-08T12:55:00Z
6
value 0.00998
scoring_system epss
scoring_elements 0.76961
published_at 2026-04-09T12:55:00Z
7
value 0.00998
scoring_system epss
scoring_elements 0.76989
published_at 2026-04-11T12:55:00Z
8
value 0.00998
scoring_system epss
scoring_elements 0.76967
published_at 2026-04-12T12:55:00Z
9
value 0.00998
scoring_system epss
scoring_elements 0.76963
published_at 2026-04-13T12:55:00Z
10
value 0.00998
scoring_system epss
scoring_elements 0.77004
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1957
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=840208
reference_id 840208
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=840208
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957
reference_id CVE-2012-1957
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-47
reference_id mfsa2012-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-47
6
reference_url https://access.redhat.com/errata/RHSA-2012:1088
reference_id RHSA-2012:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1088
7
reference_url https://access.redhat.com/errata/RHSA-2012:1089
reference_id RHSA-2012:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1089
8
reference_url https://usn.ubuntu.com/1509-1/
reference_id USN-1509-1
reference_type
scores
url https://usn.ubuntu.com/1509-1/
9
reference_url https://usn.ubuntu.com/1510-1/
reference_id USN-1510-1
reference_type
scores
url https://usn.ubuntu.com/1510-1/
fixed_packages
0
url pkg:mozilla/Thunderbird%20ESR@10.0.6
purl pkg:mozilla/Thunderbird%20ESR@10.0.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6
aliases CVE-2012-1957
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qc6-vb2t-zuh8
6
url VCID-bnfy-q3yv-k7h1
vulnerability_id VCID-bnfy-q3yv-k7h1
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1958.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1958.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1958
reference_id
reference_type
scores
0
value 0.03872
scoring_system epss
scoring_elements 0.88246
published_at 2026-04-18T12:55:00Z
1
value 0.03872
scoring_system epss
scoring_elements 0.88173
published_at 2026-04-01T12:55:00Z
2
value 0.03872
scoring_system epss
scoring_elements 0.88181
published_at 2026-04-02T12:55:00Z
3
value 0.03872
scoring_system epss
scoring_elements 0.88197
published_at 2026-04-04T12:55:00Z
4
value 0.03872
scoring_system epss
scoring_elements 0.88203
published_at 2026-04-07T12:55:00Z
5
value 0.03872
scoring_system epss
scoring_elements 0.88223
published_at 2026-04-08T12:55:00Z
6
value 0.03872
scoring_system epss
scoring_elements 0.88229
published_at 2026-04-09T12:55:00Z
7
value 0.03872
scoring_system epss
scoring_elements 0.8824
published_at 2026-04-11T12:55:00Z
8
value 0.03872
scoring_system epss
scoring_elements 0.88233
published_at 2026-04-13T12:55:00Z
9
value 0.03872
scoring_system epss
scoring_elements 0.88247
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1958
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=840211
reference_id 840211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=840211
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958
reference_id CVE-2012-1958
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-48
reference_id mfsa2012-48
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-48
6
reference_url https://access.redhat.com/errata/RHSA-2012:1088
reference_id RHSA-2012:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1088
7
reference_url https://access.redhat.com/errata/RHSA-2012:1089
reference_id RHSA-2012:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1089
8
reference_url https://usn.ubuntu.com/1509-1/
reference_id USN-1509-1
reference_type
scores
url https://usn.ubuntu.com/1509-1/
9
reference_url https://usn.ubuntu.com/1510-1/
reference_id USN-1510-1
reference_type
scores
url https://usn.ubuntu.com/1510-1/
fixed_packages
0
url pkg:mozilla/Thunderbird%20ESR@10.0.6
purl pkg:mozilla/Thunderbird%20ESR@10.0.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6
aliases CVE-2012-1958
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bnfy-q3yv-k7h1
7
url VCID-n252-jv5g-77ab
vulnerability_id VCID-n252-jv5g-77ab
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1961.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1961.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1961
reference_id
reference_type
scores
0
value 0.01172
scoring_system epss
scoring_elements 0.78709
published_at 2026-04-18T12:55:00Z
1
value 0.01172
scoring_system epss
scoring_elements 0.78633
published_at 2026-04-01T12:55:00Z
2
value 0.01172
scoring_system epss
scoring_elements 0.7864
published_at 2026-04-02T12:55:00Z
3
value 0.01172
scoring_system epss
scoring_elements 0.7867
published_at 2026-04-04T12:55:00Z
4
value 0.01172
scoring_system epss
scoring_elements 0.78651
published_at 2026-04-07T12:55:00Z
5
value 0.01172
scoring_system epss
scoring_elements 0.78677
published_at 2026-04-08T12:55:00Z
6
value 0.01172
scoring_system epss
scoring_elements 0.78683
published_at 2026-04-09T12:55:00Z
7
value 0.01172
scoring_system epss
scoring_elements 0.78708
published_at 2026-04-11T12:55:00Z
8
value 0.01172
scoring_system epss
scoring_elements 0.7869
published_at 2026-04-12T12:55:00Z
9
value 0.01172
scoring_system epss
scoring_elements 0.78682
published_at 2026-04-13T12:55:00Z
10
value 0.01172
scoring_system epss
scoring_elements 0.78711
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1961
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=840214
reference_id 840214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=840214
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961
reference_id CVE-2012-1961
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-51
reference_id mfsa2012-51
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-51
6
reference_url https://access.redhat.com/errata/RHSA-2012:1088
reference_id RHSA-2012:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1088
7
reference_url https://access.redhat.com/errata/RHSA-2012:1089
reference_id RHSA-2012:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1089
8
reference_url https://usn.ubuntu.com/1509-1/
reference_id USN-1509-1
reference_type
scores
url https://usn.ubuntu.com/1509-1/
9
reference_url https://usn.ubuntu.com/1510-1/
reference_id USN-1510-1
reference_type
scores
url https://usn.ubuntu.com/1510-1/
fixed_packages
0
url pkg:mozilla/Thunderbird%20ESR@10.0.6
purl pkg:mozilla/Thunderbird%20ESR@10.0.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6
aliases CVE-2012-1961
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n252-jv5g-77ab
8
url VCID-tw4j-8pph-yqdn
vulnerability_id VCID-tw4j-8pph-yqdn
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1963.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1963.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1963
reference_id
reference_type
scores
0
value 0.01487
scoring_system epss
scoring_elements 0.81075
published_at 2026-04-18T12:55:00Z
1
value 0.01487
scoring_system epss
scoring_elements 0.80974
published_at 2026-04-01T12:55:00Z
2
value 0.01487
scoring_system epss
scoring_elements 0.80983
published_at 2026-04-02T12:55:00Z
3
value 0.01487
scoring_system epss
scoring_elements 0.81007
published_at 2026-04-04T12:55:00Z
4
value 0.01487
scoring_system epss
scoring_elements 0.81005
published_at 2026-04-07T12:55:00Z
5
value 0.01487
scoring_system epss
scoring_elements 0.81033
published_at 2026-04-08T12:55:00Z
6
value 0.01487
scoring_system epss
scoring_elements 0.8104
published_at 2026-04-09T12:55:00Z
7
value 0.01487
scoring_system epss
scoring_elements 0.81057
published_at 2026-04-11T12:55:00Z
8
value 0.01487
scoring_system epss
scoring_elements 0.81044
published_at 2026-04-12T12:55:00Z
9
value 0.01487
scoring_system epss
scoring_elements 0.81036
published_at 2026-04-13T12:55:00Z
10
value 0.01487
scoring_system epss
scoring_elements 0.81074
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1963
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=840220
reference_id 840220
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=840220
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963
reference_id CVE-2012-1963
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-53
reference_id mfsa2012-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-53
6
reference_url https://access.redhat.com/errata/RHSA-2012:1088
reference_id RHSA-2012:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1088
7
reference_url https://access.redhat.com/errata/RHSA-2012:1089
reference_id RHSA-2012:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1089
8
reference_url https://usn.ubuntu.com/1509-1/
reference_id USN-1509-1
reference_type
scores
url https://usn.ubuntu.com/1509-1/
9
reference_url https://usn.ubuntu.com/1510-1/
reference_id USN-1510-1
reference_type
scores
url https://usn.ubuntu.com/1510-1/
fixed_packages
0
url pkg:mozilla/Thunderbird%20ESR@10.0.6
purl pkg:mozilla/Thunderbird%20ESR@10.0.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6
aliases CVE-2012-1963
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tw4j-8pph-yqdn
9
url VCID-u7w3-5raz-uyhf
vulnerability_id VCID-u7w3-5raz-uyhf
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1955.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1955.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1955
reference_id
reference_type
scores
0
value 0.02583
scoring_system epss
scoring_elements 0.85599
published_at 2026-04-18T12:55:00Z
1
value 0.02583
scoring_system epss
scoring_elements 0.85499
published_at 2026-04-01T12:55:00Z
2
value 0.02583
scoring_system epss
scoring_elements 0.85511
published_at 2026-04-02T12:55:00Z
3
value 0.02583
scoring_system epss
scoring_elements 0.85528
published_at 2026-04-04T12:55:00Z
4
value 0.02583
scoring_system epss
scoring_elements 0.85533
published_at 2026-04-07T12:55:00Z
5
value 0.02583
scoring_system epss
scoring_elements 0.85553
published_at 2026-04-08T12:55:00Z
6
value 0.02583
scoring_system epss
scoring_elements 0.85563
published_at 2026-04-09T12:55:00Z
7
value 0.02583
scoring_system epss
scoring_elements 0.85578
published_at 2026-04-11T12:55:00Z
8
value 0.02583
scoring_system epss
scoring_elements 0.85575
published_at 2026-04-12T12:55:00Z
9
value 0.02583
scoring_system epss
scoring_elements 0.85571
published_at 2026-04-13T12:55:00Z
10
value 0.02583
scoring_system epss
scoring_elements 0.85593
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1955
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=840206
reference_id 840206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=840206
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955
reference_id CVE-2012-1955
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-45
reference_id mfsa2012-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-45
6
reference_url https://access.redhat.com/errata/RHSA-2012:1088
reference_id RHSA-2012:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1088
7
reference_url https://access.redhat.com/errata/RHSA-2012:1089
reference_id RHSA-2012:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1089
8
reference_url https://usn.ubuntu.com/1509-1/
reference_id USN-1509-1
reference_type
scores
url https://usn.ubuntu.com/1509-1/
9
reference_url https://usn.ubuntu.com/1510-1/
reference_id USN-1510-1
reference_type
scores
url https://usn.ubuntu.com/1510-1/
fixed_packages
0
url pkg:mozilla/Thunderbird%20ESR@10.0.6
purl pkg:mozilla/Thunderbird%20ESR@10.0.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6
aliases CVE-2012-1955
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u7w3-5raz-uyhf
10
url VCID-vvwx-y7rj-73h7
vulnerability_id VCID-vvwx-y7rj-73h7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1962.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1962.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1962
reference_id
reference_type
scores
0
value 0.03397
scoring_system epss
scoring_elements 0.8743
published_at 2026-04-18T12:55:00Z
1
value 0.03397
scoring_system epss
scoring_elements 0.87359
published_at 2026-04-01T12:55:00Z
2
value 0.03397
scoring_system epss
scoring_elements 0.87369
published_at 2026-04-02T12:55:00Z
3
value 0.03397
scoring_system epss
scoring_elements 0.87384
published_at 2026-04-07T12:55:00Z
4
value 0.03397
scoring_system epss
scoring_elements 0.87402
published_at 2026-04-08T12:55:00Z
5
value 0.03397
scoring_system epss
scoring_elements 0.87409
published_at 2026-04-09T12:55:00Z
6
value 0.03397
scoring_system epss
scoring_elements 0.87422
published_at 2026-04-11T12:55:00Z
7
value 0.03397
scoring_system epss
scoring_elements 0.87417
published_at 2026-04-12T12:55:00Z
8
value 0.03397
scoring_system epss
scoring_elements 0.87413
published_at 2026-04-13T12:55:00Z
9
value 0.03397
scoring_system epss
scoring_elements 0.87427
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1962
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=840215
reference_id 840215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=840215
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962
reference_id CVE-2012-1962
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-52
reference_id mfsa2012-52
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-52
6
reference_url https://access.redhat.com/errata/RHSA-2012:1088
reference_id RHSA-2012:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1088
7
reference_url https://access.redhat.com/errata/RHSA-2012:1089
reference_id RHSA-2012:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1089
8
reference_url https://usn.ubuntu.com/1509-1/
reference_id USN-1509-1
reference_type
scores
url https://usn.ubuntu.com/1509-1/
9
reference_url https://usn.ubuntu.com/1510-1/
reference_id USN-1510-1
reference_type
scores
url https://usn.ubuntu.com/1510-1/
fixed_packages
0
url pkg:mozilla/Thunderbird%20ESR@10.0.6
purl pkg:mozilla/Thunderbird%20ESR@10.0.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6
aliases CVE-2012-1962
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vvwx-y7rj-73h7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.6