Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/SeaMonkey@2.10.0
Typemozilla
Namespace
NameSeaMonkey
Version2.10.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.11.0
Latest_non_vulnerable_version2.38.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1szy-64t4-2bab
vulnerability_id VCID-1szy-64t4-2bab
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1938.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1938.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1938
reference_id
reference_type
scores
0
value 0.01248
scoring_system epss
scoring_elements 0.79374
published_at 2026-04-26T12:55:00Z
1
value 0.01248
scoring_system epss
scoring_elements 0.79263
published_at 2026-04-01T12:55:00Z
2
value 0.01248
scoring_system epss
scoring_elements 0.7927
published_at 2026-04-02T12:55:00Z
3
value 0.01248
scoring_system epss
scoring_elements 0.79294
published_at 2026-04-04T12:55:00Z
4
value 0.01248
scoring_system epss
scoring_elements 0.7928
published_at 2026-04-07T12:55:00Z
5
value 0.01248
scoring_system epss
scoring_elements 0.79305
published_at 2026-04-08T12:55:00Z
6
value 0.01248
scoring_system epss
scoring_elements 0.79315
published_at 2026-04-09T12:55:00Z
7
value 0.01248
scoring_system epss
scoring_elements 0.79339
published_at 2026-04-11T12:55:00Z
8
value 0.01248
scoring_system epss
scoring_elements 0.79322
published_at 2026-04-12T12:55:00Z
9
value 0.01248
scoring_system epss
scoring_elements 0.79311
published_at 2026-04-13T12:55:00Z
10
value 0.01248
scoring_system epss
scoring_elements 0.79338
published_at 2026-04-16T12:55:00Z
11
value 0.01248
scoring_system epss
scoring_elements 0.79334
published_at 2026-04-18T12:55:00Z
12
value 0.01248
scoring_system epss
scoring_elements 0.79335
published_at 2026-04-21T12:55:00Z
13
value 0.01248
scoring_system epss
scoring_elements 0.79368
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1938
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827829
reference_id 827829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827829
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1938
reference_id CVE-2012-1938
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1938
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-34
reference_id mfsa2012-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-34
6
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
7
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
8
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
9
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
10
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.10.0
purl pkg:mozilla/SeaMonkey@2.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.10.0
aliases CVE-2012-1938
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1szy-64t4-2bab
1
url VCID-5y7y-3fnf-cueh
vulnerability_id VCID-5y7y-3fnf-cueh
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1945.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1945
reference_id
reference_type
scores
0
value 0.00192
scoring_system epss
scoring_elements 0.40988
published_at 2026-04-26T12:55:00Z
1
value 0.00192
scoring_system epss
scoring_elements 0.41093
published_at 2026-04-01T12:55:00Z
2
value 0.00192
scoring_system epss
scoring_elements 0.41185
published_at 2026-04-02T12:55:00Z
3
value 0.00192
scoring_system epss
scoring_elements 0.41216
published_at 2026-04-16T12:55:00Z
4
value 0.00192
scoring_system epss
scoring_elements 0.41142
published_at 2026-04-07T12:55:00Z
5
value 0.00192
scoring_system epss
scoring_elements 0.41191
published_at 2026-04-08T12:55:00Z
6
value 0.00192
scoring_system epss
scoring_elements 0.41199
published_at 2026-04-09T12:55:00Z
7
value 0.00192
scoring_system epss
scoring_elements 0.4122
published_at 2026-04-11T12:55:00Z
8
value 0.00192
scoring_system epss
scoring_elements 0.41187
published_at 2026-04-18T12:55:00Z
9
value 0.00192
scoring_system epss
scoring_elements 0.41173
published_at 2026-04-13T12:55:00Z
10
value 0.00192
scoring_system epss
scoring_elements 0.41114
published_at 2026-04-21T12:55:00Z
11
value 0.00192
scoring_system epss
scoring_elements 0.41003
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1945
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827831
reference_id 827831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827831
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1945
reference_id CVE-2012-1945
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1945
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-37
reference_id mfsa2012-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-37
6
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
7
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
8
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
9
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
10
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.10.0
purl pkg:mozilla/SeaMonkey@2.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.10.0
aliases CVE-2012-1945
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5y7y-3fnf-cueh
2
url VCID-8q4m-rkhj-5fhj
vulnerability_id VCID-8q4m-rkhj-5fhj
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1964.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1964.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1964
reference_id
reference_type
scores
0
value 0.00901
scoring_system epss
scoring_elements 0.75756
published_at 2026-04-26T12:55:00Z
1
value 0.00901
scoring_system epss
scoring_elements 0.75625
published_at 2026-04-01T12:55:00Z
2
value 0.00901
scoring_system epss
scoring_elements 0.75627
published_at 2026-04-02T12:55:00Z
3
value 0.00901
scoring_system epss
scoring_elements 0.75658
published_at 2026-04-04T12:55:00Z
4
value 0.00901
scoring_system epss
scoring_elements 0.75637
published_at 2026-04-07T12:55:00Z
5
value 0.00901
scoring_system epss
scoring_elements 0.75672
published_at 2026-04-08T12:55:00Z
6
value 0.00901
scoring_system epss
scoring_elements 0.75683
published_at 2026-04-09T12:55:00Z
7
value 0.00901
scoring_system epss
scoring_elements 0.75707
published_at 2026-04-11T12:55:00Z
8
value 0.00901
scoring_system epss
scoring_elements 0.75688
published_at 2026-04-12T12:55:00Z
9
value 0.00901
scoring_system epss
scoring_elements 0.75682
published_at 2026-04-13T12:55:00Z
10
value 0.00901
scoring_system epss
scoring_elements 0.7572
published_at 2026-04-16T12:55:00Z
11
value 0.00901
scoring_system epss
scoring_elements 0.75724
published_at 2026-04-18T12:55:00Z
12
value 0.00901
scoring_system epss
scoring_elements 0.7571
published_at 2026-04-21T12:55:00Z
13
value 0.00901
scoring_system epss
scoring_elements 0.7575
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1964
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=840222
reference_id 840222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=840222
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1964
reference_id CVE-2012-1964
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1964
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-54
reference_id mfsa2012-54
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-54
6
reference_url https://access.redhat.com/errata/RHSA-2012:1088
reference_id RHSA-2012:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1088
7
reference_url https://access.redhat.com/errata/RHSA-2012:1089
reference_id RHSA-2012:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1089
8
reference_url https://usn.ubuntu.com/1509-1/
reference_id USN-1509-1
reference_type
scores
url https://usn.ubuntu.com/1509-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.10.0
purl pkg:mozilla/SeaMonkey@2.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.10.0
aliases CVE-2012-1964
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8q4m-rkhj-5fhj
3
url VCID-bfd8-7p4k-abae
vulnerability_id VCID-bfd8-7p4k-abae
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0441.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0441.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0441
reference_id
reference_type
scores
0
value 0.03581
scoring_system epss
scoring_elements 0.87779
published_at 2026-04-26T12:55:00Z
1
value 0.03581
scoring_system epss
scoring_elements 0.87689
published_at 2026-04-01T12:55:00Z
2
value 0.03581
scoring_system epss
scoring_elements 0.87699
published_at 2026-04-02T12:55:00Z
3
value 0.03581
scoring_system epss
scoring_elements 0.87711
published_at 2026-04-04T12:55:00Z
4
value 0.03581
scoring_system epss
scoring_elements 0.87713
published_at 2026-04-07T12:55:00Z
5
value 0.03581
scoring_system epss
scoring_elements 0.87735
published_at 2026-04-08T12:55:00Z
6
value 0.03581
scoring_system epss
scoring_elements 0.87741
published_at 2026-04-09T12:55:00Z
7
value 0.03581
scoring_system epss
scoring_elements 0.87751
published_at 2026-04-11T12:55:00Z
8
value 0.03581
scoring_system epss
scoring_elements 0.87745
published_at 2026-04-12T12:55:00Z
9
value 0.03581
scoring_system epss
scoring_elements 0.87744
published_at 2026-04-13T12:55:00Z
10
value 0.03581
scoring_system epss
scoring_elements 0.87758
published_at 2026-04-16T12:55:00Z
11
value 0.03581
scoring_system epss
scoring_elements 0.87757
published_at 2026-04-18T12:55:00Z
12
value 0.03581
scoring_system epss
scoring_elements 0.87756
published_at 2026-04-21T12:55:00Z
13
value 0.03581
scoring_system epss
scoring_elements 0.87773
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0441
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827833
reference_id 827833
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827833
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0441
reference_id CVE-2012-0441
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0441
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-39
reference_id mfsa2012-39
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-39
6
reference_url https://access.redhat.com/errata/RHSA-2012:1090
reference_id RHSA-2012:1090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1090
7
reference_url https://access.redhat.com/errata/RHSA-2012:1091
reference_id RHSA-2012:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1091
8
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
9
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
10
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
11
reference_url https://usn.ubuntu.com/1540-1/
reference_id USN-1540-1
reference_type
scores
url https://usn.ubuntu.com/1540-1/
12
reference_url https://usn.ubuntu.com/1540-2/
reference_id USN-1540-2
reference_type
scores
url https://usn.ubuntu.com/1540-2/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.10.0
purl pkg:mozilla/SeaMonkey@2.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.10.0
aliases CVE-2012-0441
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bfd8-7p4k-abae
4
url VCID-cq4q-mh6g-aub7
vulnerability_id VCID-cq4q-mh6g-aub7
summary
Security researcher Adam Barth found that inline event handlers, such as onclick, were no longer blocked by Content Security
Policy's (CSP) inline-script blocking feature. Web applications relying on this feature of CSP to protect against cross-site scripting (XSS) were not fully protected.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1944.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1944.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1944
reference_id
reference_type
scores
0
value 0.00696
scoring_system epss
scoring_elements 0.71993
published_at 2026-04-26T12:55:00Z
1
value 0.00696
scoring_system epss
scoring_elements 0.71873
published_at 2026-04-01T12:55:00Z
2
value 0.00696
scoring_system epss
scoring_elements 0.7188
published_at 2026-04-02T12:55:00Z
3
value 0.00696
scoring_system epss
scoring_elements 0.71899
published_at 2026-04-04T12:55:00Z
4
value 0.00696
scoring_system epss
scoring_elements 0.71871
published_at 2026-04-07T12:55:00Z
5
value 0.00696
scoring_system epss
scoring_elements 0.7191
published_at 2026-04-13T12:55:00Z
6
value 0.00696
scoring_system epss
scoring_elements 0.71921
published_at 2026-04-09T12:55:00Z
7
value 0.00696
scoring_system epss
scoring_elements 0.71945
published_at 2026-04-11T12:55:00Z
8
value 0.00696
scoring_system epss
scoring_elements 0.71927
published_at 2026-04-12T12:55:00Z
9
value 0.00696
scoring_system epss
scoring_elements 0.71952
published_at 2026-04-16T12:55:00Z
10
value 0.00696
scoring_system epss
scoring_elements 0.71956
published_at 2026-04-18T12:55:00Z
11
value 0.00696
scoring_system epss
scoring_elements 0.71941
published_at 2026-04-21T12:55:00Z
12
value 0.00696
scoring_system epss
scoring_elements 0.71986
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1944
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827830
reference_id 827830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827830
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1944
reference_id CVE-2012-1944
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1944
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-36
reference_id mfsa2012-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-36
5
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
6
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
7
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
8
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
9
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.10.0
purl pkg:mozilla/SeaMonkey@2.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.10.0
aliases CVE-2012-1944
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cq4q-mh6g-aub7
5
url VCID-gjxf-vn2v-pkcp
vulnerability_id VCID-gjxf-vn2v-pkcp
summary
Security researcher Robert Kugler discovered that in some
instances the Mozilla Maintenance Service on Windows will be vulnerable to some
previously fixed privilege escalation attacks that allowed for local privilege
escalation. This was caused by the Mozilla Updater not updating Windows Registry
entries for the Mozilla Maintenance Service, which fixed the earlier issues
present if Firefox 12 had been installed. New installations of Firefox after
version 12 are not affected by this issue. Local file system access is necessary
in order for this issue to be exploitable and it cannot be triggered through web
content.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1942
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13768
published_at 2026-04-26T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13777
published_at 2026-04-21T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13799
published_at 2026-04-24T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13852
published_at 2026-04-01T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13934
published_at 2026-04-02T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13991
published_at 2026-04-04T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13793
published_at 2026-04-07T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13876
published_at 2026-04-08T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13928
published_at 2026-04-09T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13885
published_at 2026-04-11T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13849
published_at 2026-04-12T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13801
published_at 2026-04-13T12:55:00Z
12
value 0.00045
scoring_system epss
scoring_elements 0.1371
published_at 2026-04-16T12:55:00Z
13
value 0.00045
scoring_system epss
scoring_elements 0.13705
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1942
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1942
reference_id CVE-2012-1942
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1942
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-35
reference_id mfsa2012-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-35
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-45
reference_id mfsa2013-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-45
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.10.0
purl pkg:mozilla/SeaMonkey@2.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.10.0
aliases CVE-2012-1942
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gjxf-vn2v-pkcp
6
url VCID-s3m1-pnhd-n3ex
vulnerability_id VCID-s3m1-pnhd-n3ex
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1947.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1947
reference_id
reference_type
scores
0
value 0.06784
scoring_system epss
scoring_elements 0.91347
published_at 2026-04-26T12:55:00Z
1
value 0.06784
scoring_system epss
scoring_elements 0.91265
published_at 2026-04-01T12:55:00Z
2
value 0.06784
scoring_system epss
scoring_elements 0.91269
published_at 2026-04-02T12:55:00Z
3
value 0.06784
scoring_system epss
scoring_elements 0.91279
published_at 2026-04-04T12:55:00Z
4
value 0.06784
scoring_system epss
scoring_elements 0.91286
published_at 2026-04-07T12:55:00Z
5
value 0.06784
scoring_system epss
scoring_elements 0.91298
published_at 2026-04-08T12:55:00Z
6
value 0.06784
scoring_system epss
scoring_elements 0.91304
published_at 2026-04-09T12:55:00Z
7
value 0.06784
scoring_system epss
scoring_elements 0.91311
published_at 2026-04-11T12:55:00Z
8
value 0.06784
scoring_system epss
scoring_elements 0.91314
published_at 2026-04-12T12:55:00Z
9
value 0.06784
scoring_system epss
scoring_elements 0.91313
published_at 2026-04-13T12:55:00Z
10
value 0.06784
scoring_system epss
scoring_elements 0.91338
published_at 2026-04-21T12:55:00Z
11
value 0.06784
scoring_system epss
scoring_elements 0.91337
published_at 2026-04-18T12:55:00Z
12
value 0.06784
scoring_system epss
scoring_elements 0.91348
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1947
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827843
reference_id 827843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1947
reference_id CVE-2012-1947
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1947
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-40
reference_id mfsa2012-40
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-40
6
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
7
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
8
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
9
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
10
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.10.0
purl pkg:mozilla/SeaMonkey@2.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.10.0
aliases CVE-2012-1947
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3m1-pnhd-n3ex
7
url VCID-v5y5-u355-mbdd
vulnerability_id VCID-v5y5-u355-mbdd
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1946.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1946
reference_id
reference_type
scores
0
value 0.01451
scoring_system epss
scoring_elements 0.80853
published_at 2026-04-26T12:55:00Z
1
value 0.01451
scoring_system epss
scoring_elements 0.80727
published_at 2026-04-01T12:55:00Z
2
value 0.01451
scoring_system epss
scoring_elements 0.80736
published_at 2026-04-02T12:55:00Z
3
value 0.01451
scoring_system epss
scoring_elements 0.80757
published_at 2026-04-04T12:55:00Z
4
value 0.01451
scoring_system epss
scoring_elements 0.80754
published_at 2026-04-07T12:55:00Z
5
value 0.01451
scoring_system epss
scoring_elements 0.80782
published_at 2026-04-08T12:55:00Z
6
value 0.01451
scoring_system epss
scoring_elements 0.80791
published_at 2026-04-09T12:55:00Z
7
value 0.01451
scoring_system epss
scoring_elements 0.80807
published_at 2026-04-11T12:55:00Z
8
value 0.01451
scoring_system epss
scoring_elements 0.80792
published_at 2026-04-12T12:55:00Z
9
value 0.01451
scoring_system epss
scoring_elements 0.80784
published_at 2026-04-13T12:55:00Z
10
value 0.01451
scoring_system epss
scoring_elements 0.8082
published_at 2026-04-16T12:55:00Z
11
value 0.01451
scoring_system epss
scoring_elements 0.80823
published_at 2026-04-18T12:55:00Z
12
value 0.01451
scoring_system epss
scoring_elements 0.80824
published_at 2026-04-21T12:55:00Z
13
value 0.01451
scoring_system epss
scoring_elements 0.80847
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1946
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827832
reference_id 827832
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827832
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1946
reference_id CVE-2012-1946
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1946
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-38
reference_id mfsa2012-38
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-38
6
reference_url https://access.redhat.com/errata/RHSA-2012:0710
reference_id RHSA-2012:0710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0710
7
reference_url https://access.redhat.com/errata/RHSA-2012:0715
reference_id RHSA-2012:0715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0715
8
reference_url https://usn.ubuntu.com/1463-1/
reference_id USN-1463-1
reference_type
scores
url https://usn.ubuntu.com/1463-1/
9
reference_url https://usn.ubuntu.com/1463-4/
reference_id USN-1463-4
reference_type
scores
url https://usn.ubuntu.com/1463-4/
10
reference_url https://usn.ubuntu.com/1463-6/
reference_id USN-1463-6
reference_type
scores
url https://usn.ubuntu.com/1463-6/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.10.0
purl pkg:mozilla/SeaMonkey@2.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.10.0
aliases CVE-2012-1946
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v5y5-u355-mbdd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.10.0