Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/Firefox%20OS@2.2.0
Typemozilla
Namespace
NameFirefox OS
Version2.2.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.5.0
Latest_non_vulnerable_version2.5.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-45ek-y9nx-j3cd
vulnerability_id VCID-45ek-y9nx-j3cd
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0831
reference_id
reference_type
scores
0
value 0.02019
scoring_system epss
scoring_elements 0.83814
published_at 2026-04-24T12:55:00Z
1
value 0.02019
scoring_system epss
scoring_elements 0.83688
published_at 2026-04-01T12:55:00Z
2
value 0.02019
scoring_system epss
scoring_elements 0.83701
published_at 2026-04-02T12:55:00Z
3
value 0.02019
scoring_system epss
scoring_elements 0.83715
published_at 2026-04-04T12:55:00Z
4
value 0.02019
scoring_system epss
scoring_elements 0.83718
published_at 2026-04-07T12:55:00Z
5
value 0.02019
scoring_system epss
scoring_elements 0.83742
published_at 2026-04-08T12:55:00Z
6
value 0.02019
scoring_system epss
scoring_elements 0.83749
published_at 2026-04-09T12:55:00Z
7
value 0.02019
scoring_system epss
scoring_elements 0.83765
published_at 2026-04-11T12:55:00Z
8
value 0.02019
scoring_system epss
scoring_elements 0.83759
published_at 2026-04-12T12:55:00Z
9
value 0.02019
scoring_system epss
scoring_elements 0.83754
published_at 2026-04-13T12:55:00Z
10
value 0.02019
scoring_system epss
scoring_elements 0.83788
published_at 2026-04-16T12:55:00Z
11
value 0.02019
scoring_system epss
scoring_elements 0.83789
published_at 2026-04-18T12:55:00Z
12
value 0.02019
scoring_system epss
scoring_elements 0.8379
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0831
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195619
reference_id 1195619
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195619
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-16
reference_id mfsa2015-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-16
9
reference_url https://access.redhat.com/errata/RHSA-2015:0265
reference_id RHSA-2015:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0265
10
reference_url https://access.redhat.com/errata/RHSA-2015:0266
reference_id RHSA-2015:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0266
11
reference_url https://access.redhat.com/errata/RHSA-2015:0629
reference_id RHSA-2015:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0629
12
reference_url https://access.redhat.com/errata/RHSA-2015:0642
reference_id RHSA-2015:0642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0642
13
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
14
reference_url https://usn.ubuntu.com/2506-1/
reference_id USN-2506-1
reference_type
scores
url https://usn.ubuntu.com/2506-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0831
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45ek-y9nx-j3cd
1
url VCID-4vhr-24e3-d3d2
vulnerability_id VCID-4vhr-24e3-d3d2
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1593.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1593.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1593
reference_id
reference_type
scores
0
value 0.0211
scoring_system epss
scoring_elements 0.84158
published_at 2026-04-24T12:55:00Z
1
value 0.0211
scoring_system epss
scoring_elements 0.84038
published_at 2026-04-01T12:55:00Z
2
value 0.0211
scoring_system epss
scoring_elements 0.8413
published_at 2026-04-18T12:55:00Z
3
value 0.0211
scoring_system epss
scoring_elements 0.84134
published_at 2026-04-21T12:55:00Z
4
value 0.0211
scoring_system epss
scoring_elements 0.84051
published_at 2026-04-02T12:55:00Z
5
value 0.0211
scoring_system epss
scoring_elements 0.84068
published_at 2026-04-04T12:55:00Z
6
value 0.0211
scoring_system epss
scoring_elements 0.84069
published_at 2026-04-07T12:55:00Z
7
value 0.0211
scoring_system epss
scoring_elements 0.84093
published_at 2026-04-08T12:55:00Z
8
value 0.0211
scoring_system epss
scoring_elements 0.84099
published_at 2026-04-09T12:55:00Z
9
value 0.0211
scoring_system epss
scoring_elements 0.84117
published_at 2026-04-11T12:55:00Z
10
value 0.0211
scoring_system epss
scoring_elements 0.8411
published_at 2026-04-12T12:55:00Z
11
value 0.0211
scoring_system epss
scoring_elements 0.84106
published_at 2026-04-13T12:55:00Z
12
value 0.0211
scoring_system epss
scoring_elements 0.84128
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1593
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1085175
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1085175
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
11
reference_url http://www.debian.org/security/2014/dsa-3090
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3090
12
reference_url http://www.debian.org/security/2014/dsa-3092
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3092
13
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-88.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-88.html
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
15
reference_url http://www.securityfocus.com/bid/71395
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71395
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169209
reference_id 1169209
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169209
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1593
reference_id CVE-2014-1593
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1593
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-88
reference_id mfsa2014-88
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-88
23
reference_url https://access.redhat.com/errata/RHSA-2014:1919
reference_id RHSA-2014:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1919
24
reference_url https://access.redhat.com/errata/RHSA-2014:1924
reference_id RHSA-2014:1924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1924
25
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
26
reference_url https://usn.ubuntu.com/2428-1/
reference_id USN-2428-1
reference_type
scores
url https://usn.ubuntu.com/2428-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-1593
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4vhr-24e3-d3d2
2
url VCID-51hn-ab8w-c7bn
vulnerability_id VCID-51hn-ab8w-c7bn
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2713
reference_id
reference_type
scores
0
value 0.01751
scoring_system epss
scoring_elements 0.8262
published_at 2026-04-24T12:55:00Z
1
value 0.01751
scoring_system epss
scoring_elements 0.8249
published_at 2026-04-01T12:55:00Z
2
value 0.01751
scoring_system epss
scoring_elements 0.82504
published_at 2026-04-02T12:55:00Z
3
value 0.01751
scoring_system epss
scoring_elements 0.82522
published_at 2026-04-04T12:55:00Z
4
value 0.01751
scoring_system epss
scoring_elements 0.82519
published_at 2026-04-07T12:55:00Z
5
value 0.01751
scoring_system epss
scoring_elements 0.82545
published_at 2026-04-08T12:55:00Z
6
value 0.01751
scoring_system epss
scoring_elements 0.82552
published_at 2026-04-09T12:55:00Z
7
value 0.01751
scoring_system epss
scoring_elements 0.82571
published_at 2026-04-11T12:55:00Z
8
value 0.01751
scoring_system epss
scoring_elements 0.82564
published_at 2026-04-12T12:55:00Z
9
value 0.01751
scoring_system epss
scoring_elements 0.82558
published_at 2026-04-13T12:55:00Z
10
value 0.01751
scoring_system epss
scoring_elements 0.82595
published_at 2026-04-18T12:55:00Z
11
value 0.01751
scoring_system epss
scoring_elements 0.82599
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2713
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220605
reference_id 1220605
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220605
9
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-51
reference_id mfsa2015-51
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-51
11
reference_url https://access.redhat.com/errata/RHSA-2015:0988
reference_id RHSA-2015:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0988
12
reference_url https://access.redhat.com/errata/RHSA-2015:1012
reference_id RHSA-2015:1012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1012
13
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
14
reference_url https://usn.ubuntu.com/2603-1/
reference_id USN-2603-1
reference_type
scores
url https://usn.ubuntu.com/2603-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2713
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-51hn-ab8w-c7bn
3
url VCID-55jd-xx14-d3h3
vulnerability_id VCID-55jd-xx14-d3h3
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0802
reference_id
reference_type
scores
0
value 0.80386
scoring_system epss
scoring_elements 0.99132
published_at 2026-04-24T12:55:00Z
1
value 0.80386
scoring_system epss
scoring_elements 0.99115
published_at 2026-04-01T12:55:00Z
2
value 0.80386
scoring_system epss
scoring_elements 0.99116
published_at 2026-04-02T12:55:00Z
3
value 0.80386
scoring_system epss
scoring_elements 0.99118
published_at 2026-04-04T12:55:00Z
4
value 0.80386
scoring_system epss
scoring_elements 0.99122
published_at 2026-04-07T12:55:00Z
5
value 0.80386
scoring_system epss
scoring_elements 0.99123
published_at 2026-04-09T12:55:00Z
6
value 0.80386
scoring_system epss
scoring_elements 0.99124
published_at 2026-04-13T12:55:00Z
7
value 0.80386
scoring_system epss
scoring_elements 0.99125
published_at 2026-04-16T12:55:00Z
8
value 0.80386
scoring_system epss
scoring_elements 0.99126
published_at 2026-04-18T12:55:00Z
9
value 0.80386
scoring_system epss
scoring_elements 0.99128
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0802
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207086
reference_id 1207086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207086
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802
reference_id CVE-2015-0802
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb
reference_id CVE-2015-0816;CVE-2015-0802;OSVDB-120107;OSVDB-119753
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb
5
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-42
reference_id mfsa2015-42
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-42
7
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0802
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55jd-xx14-d3h3
4
url VCID-55t4-7jnq-j7fx
vulnerability_id VCID-55t4-7jnq-j7fx
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2716
reference_id
reference_type
scores
0
value 0.05614
scoring_system epss
scoring_elements 0.90354
published_at 2026-04-24T12:55:00Z
1
value 0.05614
scoring_system epss
scoring_elements 0.90283
published_at 2026-04-01T12:55:00Z
2
value 0.05614
scoring_system epss
scoring_elements 0.90286
published_at 2026-04-02T12:55:00Z
3
value 0.05614
scoring_system epss
scoring_elements 0.90299
published_at 2026-04-04T12:55:00Z
4
value 0.05614
scoring_system epss
scoring_elements 0.90303
published_at 2026-04-07T12:55:00Z
5
value 0.05614
scoring_system epss
scoring_elements 0.90318
published_at 2026-04-08T12:55:00Z
6
value 0.05614
scoring_system epss
scoring_elements 0.90325
published_at 2026-04-09T12:55:00Z
7
value 0.05614
scoring_system epss
scoring_elements 0.90333
published_at 2026-04-11T12:55:00Z
8
value 0.05614
scoring_system epss
scoring_elements 0.90332
published_at 2026-04-12T12:55:00Z
9
value 0.05614
scoring_system epss
scoring_elements 0.90326
published_at 2026-04-13T12:55:00Z
10
value 0.05614
scoring_system epss
scoring_elements 0.90342
published_at 2026-04-18T12:55:00Z
11
value 0.05614
scoring_system epss
scoring_elements 0.90339
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2716
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220607
reference_id 1220607
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220607
9
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-54
reference_id mfsa2015-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-54
11
reference_url https://access.redhat.com/errata/RHSA-2015:0988
reference_id RHSA-2015:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0988
12
reference_url https://access.redhat.com/errata/RHSA-2015:1012
reference_id RHSA-2015:1012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1012
13
reference_url https://access.redhat.com/errata/RHSA-2020:1011
reference_id RHSA-2020:1011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1011
14
reference_url https://access.redhat.com/errata/RHSA-2020:2508
reference_id RHSA-2020:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2508
15
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
16
reference_url https://usn.ubuntu.com/2603-1/
reference_id USN-2603-1
reference_type
scores
url https://usn.ubuntu.com/2603-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2716
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55t4-7jnq-j7fx
5
url VCID-63hm-xmht-g3cp
vulnerability_id VCID-63hm-xmht-g3cp
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1592.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1592.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1592
reference_id
reference_type
scores
0
value 0.01768
scoring_system epss
scoring_elements 0.827
published_at 2026-04-24T12:55:00Z
1
value 0.01768
scoring_system epss
scoring_elements 0.82569
published_at 2026-04-01T12:55:00Z
2
value 0.01768
scoring_system epss
scoring_elements 0.82675
published_at 2026-04-18T12:55:00Z
3
value 0.01768
scoring_system epss
scoring_elements 0.82678
published_at 2026-04-21T12:55:00Z
4
value 0.01768
scoring_system epss
scoring_elements 0.82584
published_at 2026-04-02T12:55:00Z
5
value 0.01768
scoring_system epss
scoring_elements 0.82599
published_at 2026-04-04T12:55:00Z
6
value 0.01768
scoring_system epss
scoring_elements 0.82595
published_at 2026-04-07T12:55:00Z
7
value 0.01768
scoring_system epss
scoring_elements 0.82621
published_at 2026-04-08T12:55:00Z
8
value 0.01768
scoring_system epss
scoring_elements 0.82629
published_at 2026-04-09T12:55:00Z
9
value 0.01768
scoring_system epss
scoring_elements 0.82647
published_at 2026-04-11T12:55:00Z
10
value 0.01768
scoring_system epss
scoring_elements 0.82642
published_at 2026-04-12T12:55:00Z
11
value 0.01768
scoring_system epss
scoring_elements 0.82637
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1592
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1088635
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1088635
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
11
reference_url http://www.debian.org/security/2014/dsa-3090
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3090
12
reference_url http://www.debian.org/security/2014/dsa-3092
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3092
13
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-87.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-87.html
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
15
reference_url http://www.securityfocus.com/bid/71398
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71398
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169208
reference_id 1169208
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169208
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1592
reference_id CVE-2014-1592
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1592
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-87
reference_id mfsa2014-87
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-87
23
reference_url https://access.redhat.com/errata/RHSA-2014:1919
reference_id RHSA-2014:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1919
24
reference_url https://access.redhat.com/errata/RHSA-2014:1924
reference_id RHSA-2014:1924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1924
25
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
26
reference_url https://usn.ubuntu.com/2428-1/
reference_id USN-2428-1
reference_type
scores
url https://usn.ubuntu.com/2428-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-1592
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63hm-xmht-g3cp
6
url VCID-7yp8-9btm-zqgn
vulnerability_id VCID-7yp8-9btm-zqgn
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2743.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2743
reference_id
reference_type
scores
0
value 0.01074
scoring_system epss
scoring_elements 0.77832
published_at 2026-04-24T12:55:00Z
1
value 0.01074
scoring_system epss
scoring_elements 0.7771
published_at 2026-04-01T12:55:00Z
2
value 0.01074
scoring_system epss
scoring_elements 0.77717
published_at 2026-04-02T12:55:00Z
3
value 0.01074
scoring_system epss
scoring_elements 0.77744
published_at 2026-04-04T12:55:00Z
4
value 0.01074
scoring_system epss
scoring_elements 0.77727
published_at 2026-04-07T12:55:00Z
5
value 0.01074
scoring_system epss
scoring_elements 0.77755
published_at 2026-04-08T12:55:00Z
6
value 0.01074
scoring_system epss
scoring_elements 0.7776
published_at 2026-04-09T12:55:00Z
7
value 0.01074
scoring_system epss
scoring_elements 0.77786
published_at 2026-04-11T12:55:00Z
8
value 0.01074
scoring_system epss
scoring_elements 0.7777
published_at 2026-04-13T12:55:00Z
9
value 0.01074
scoring_system epss
scoring_elements 0.77806
published_at 2026-04-16T12:55:00Z
10
value 0.01074
scoring_system epss
scoring_elements 0.77805
published_at 2026-04-18T12:55:00Z
11
value 0.01074
scoring_system epss
scoring_elements 0.77799
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236964
reference_id 1236964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236964
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-69
reference_id mfsa2015-69
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-69
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
20
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2743
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7yp8-9btm-zqgn
7
url VCID-82k6-qk5e-cuag
vulnerability_id VCID-82k6-qk5e-cuag
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2729
reference_id
reference_type
scores
0
value 0.00413
scoring_system epss
scoring_elements 0.61544
published_at 2026-04-24T12:55:00Z
1
value 0.00413
scoring_system epss
scoring_elements 0.61402
published_at 2026-04-01T12:55:00Z
2
value 0.00413
scoring_system epss
scoring_elements 0.61478
published_at 2026-04-02T12:55:00Z
3
value 0.00413
scoring_system epss
scoring_elements 0.61507
published_at 2026-04-04T12:55:00Z
4
value 0.00413
scoring_system epss
scoring_elements 0.61477
published_at 2026-04-07T12:55:00Z
5
value 0.00413
scoring_system epss
scoring_elements 0.61524
published_at 2026-04-08T12:55:00Z
6
value 0.00413
scoring_system epss
scoring_elements 0.61539
published_at 2026-04-09T12:55:00Z
7
value 0.00413
scoring_system epss
scoring_elements 0.61561
published_at 2026-04-11T12:55:00Z
8
value 0.00413
scoring_system epss
scoring_elements 0.61548
published_at 2026-04-12T12:55:00Z
9
value 0.00413
scoring_system epss
scoring_elements 0.61527
published_at 2026-04-13T12:55:00Z
10
value 0.00413
scoring_system epss
scoring_elements 0.61569
published_at 2026-04-16T12:55:00Z
11
value 0.00413
scoring_system epss
scoring_elements 0.61573
published_at 2026-04-18T12:55:00Z
12
value 0.00413
scoring_system epss
scoring_elements 0.61557
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2729
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236952
reference_id 1236952
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236952
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729
reference_id CVE-2015-2729
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-62
reference_id mfsa2015-62
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-62
6
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
7
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
8
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2729
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-82k6-qk5e-cuag
8
url VCID-89pc-vcy3-tkd7
vulnerability_id VCID-89pc-vcy3-tkd7
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2718
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30538
published_at 2026-04-24T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30739
published_at 2026-04-01T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30865
published_at 2026-04-02T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30911
published_at 2026-04-04T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30731
published_at 2026-04-07T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30789
published_at 2026-04-08T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30821
published_at 2026-04-09T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30822
published_at 2026-04-11T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30778
published_at 2026-04-12T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30733
published_at 2026-04-13T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30757
published_at 2026-04-16T12:55:00Z
11
value 0.00118
scoring_system epss
scoring_elements 0.30738
published_at 2026-04-18T12:55:00Z
12
value 0.00118
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2718
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220609
reference_id 1220609
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220609
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718
reference_id CVE-2015-2718
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718
4
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-56
reference_id mfsa2015-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-56
6
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2718
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-89pc-vcy3-tkd7
9
url VCID-8s1b-yh8y-cbdk
vulnerability_id VCID-8s1b-yh8y-cbdk
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1587.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1587.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1587
reference_id
reference_type
scores
0
value 0.01643
scoring_system epss
scoring_elements 0.82017
published_at 2026-04-24T12:55:00Z
1
value 0.01643
scoring_system epss
scoring_elements 0.8189
published_at 2026-04-01T12:55:00Z
2
value 0.01643
scoring_system epss
scoring_elements 0.81993
published_at 2026-04-18T12:55:00Z
3
value 0.01643
scoring_system epss
scoring_elements 0.81995
published_at 2026-04-21T12:55:00Z
4
value 0.01643
scoring_system epss
scoring_elements 0.81901
published_at 2026-04-02T12:55:00Z
5
value 0.01643
scoring_system epss
scoring_elements 0.81924
published_at 2026-04-04T12:55:00Z
6
value 0.01643
scoring_system epss
scoring_elements 0.8192
published_at 2026-04-07T12:55:00Z
7
value 0.01643
scoring_system epss
scoring_elements 0.81947
published_at 2026-04-08T12:55:00Z
8
value 0.01643
scoring_system epss
scoring_elements 0.81954
published_at 2026-04-09T12:55:00Z
9
value 0.01643
scoring_system epss
scoring_elements 0.81974
published_at 2026-04-11T12:55:00Z
10
value 0.01643
scoring_system epss
scoring_elements 0.81963
published_at 2026-04-12T12:55:00Z
11
value 0.01643
scoring_system epss
scoring_elements 0.81958
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1587
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1042567
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1042567
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1072847
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1072847
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1079729
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1079729
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1080312
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1080312
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1089207
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1089207
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
15
reference_url http://www.debian.org/security/2014/dsa-3090
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3090
16
reference_url http://www.debian.org/security/2014/dsa-3092
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3092
17
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
18
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
19
reference_url http://www.securityfocus.com/bid/71391
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71391
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169201
reference_id 1169201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169201
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1587
reference_id CVE-2014-1587
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1587
25
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-83
reference_id mfsa2014-83
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-83
27
reference_url https://access.redhat.com/errata/RHSA-2014:1919
reference_id RHSA-2014:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1919
28
reference_url https://access.redhat.com/errata/RHSA-2014:1924
reference_id RHSA-2014:1924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1924
29
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
30
reference_url https://usn.ubuntu.com/2428-1/
reference_id USN-2428-1
reference_type
scores
url https://usn.ubuntu.com/2428-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-1587
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8s1b-yh8y-cbdk
10
url VCID-9bat-kqxd-gkg2
vulnerability_id VCID-9bat-kqxd-gkg2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8634.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8634.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8634
reference_id
reference_type
scores
0
value 0.01748
scoring_system epss
scoring_elements 0.82608
published_at 2026-04-24T12:55:00Z
1
value 0.01748
scoring_system epss
scoring_elements 0.82474
published_at 2026-04-01T12:55:00Z
2
value 0.01748
scoring_system epss
scoring_elements 0.82488
published_at 2026-04-02T12:55:00Z
3
value 0.01748
scoring_system epss
scoring_elements 0.82506
published_at 2026-04-04T12:55:00Z
4
value 0.01748
scoring_system epss
scoring_elements 0.82502
published_at 2026-04-07T12:55:00Z
5
value 0.01748
scoring_system epss
scoring_elements 0.82529
published_at 2026-04-08T12:55:00Z
6
value 0.01748
scoring_system epss
scoring_elements 0.82536
published_at 2026-04-09T12:55:00Z
7
value 0.01748
scoring_system epss
scoring_elements 0.82555
published_at 2026-04-11T12:55:00Z
8
value 0.01748
scoring_system epss
scoring_elements 0.8255
published_at 2026-04-12T12:55:00Z
9
value 0.01748
scoring_system epss
scoring_elements 0.82545
published_at 2026-04-13T12:55:00Z
10
value 0.01748
scoring_system epss
scoring_elements 0.82582
published_at 2026-04-18T12:55:00Z
11
value 0.01748
scoring_system epss
scoring_elements 0.82586
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8634
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180962
reference_id 1180962
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180962
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-01
reference_id mfsa2015-01
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-01
9
reference_url https://access.redhat.com/errata/RHSA-2015:0046
reference_id RHSA-2015:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0046
10
reference_url https://access.redhat.com/errata/RHSA-2015:0047
reference_id RHSA-2015:0047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0047
11
reference_url https://usn.ubuntu.com/2458-1/
reference_id USN-2458-1
reference_type
scores
url https://usn.ubuntu.com/2458-1/
12
reference_url https://usn.ubuntu.com/2460-1/
reference_id USN-2460-1
reference_type
scores
url https://usn.ubuntu.com/2460-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-8634
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9bat-kqxd-gkg2
11
url VCID-9e6r-hnyd-6ufr
vulnerability_id VCID-9e6r-hnyd-6ufr
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0834
reference_id
reference_type
scores
0
value 0.00514
scoring_system epss
scoring_elements 0.66637
published_at 2026-04-24T12:55:00Z
1
value 0.00514
scoring_system epss
scoring_elements 0.66501
published_at 2026-04-01T12:55:00Z
2
value 0.00514
scoring_system epss
scoring_elements 0.6654
published_at 2026-04-02T12:55:00Z
3
value 0.00514
scoring_system epss
scoring_elements 0.66566
published_at 2026-04-04T12:55:00Z
4
value 0.00514
scoring_system epss
scoring_elements 0.66538
published_at 2026-04-07T12:55:00Z
5
value 0.00514
scoring_system epss
scoring_elements 0.66586
published_at 2026-04-08T12:55:00Z
6
value 0.00514
scoring_system epss
scoring_elements 0.66599
published_at 2026-04-09T12:55:00Z
7
value 0.00514
scoring_system epss
scoring_elements 0.66618
published_at 2026-04-11T12:55:00Z
8
value 0.00514
scoring_system epss
scoring_elements 0.66606
published_at 2026-04-12T12:55:00Z
9
value 0.00514
scoring_system epss
scoring_elements 0.66573
published_at 2026-04-13T12:55:00Z
10
value 0.00514
scoring_system epss
scoring_elements 0.66609
published_at 2026-04-16T12:55:00Z
11
value 0.00514
scoring_system epss
scoring_elements 0.66627
published_at 2026-04-18T12:55:00Z
12
value 0.00514
scoring_system epss
scoring_elements 0.66612
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0834
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195616
reference_id 1195616
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195616
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834
reference_id CVE-2015-0834
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-15
reference_id mfsa2015-15
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-15
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0834
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9e6r-hnyd-6ufr
12
url VCID-cjda-dm64-kqg2
vulnerability_id VCID-cjda-dm64-kqg2
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1635.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1635.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1647.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1647.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1574.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1574.json
11
reference_url https://advisories.mageia.org/MGASA-2014-0421.html
reference_id
reference_type
scores
url https://advisories.mageia.org/MGASA-2014-0421.html
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1574
reference_id
reference_type
scores
0
value 0.01644
scoring_system epss
scoring_elements 0.82024
published_at 2026-04-24T12:55:00Z
1
value 0.01644
scoring_system epss
scoring_elements 0.81896
published_at 2026-04-01T12:55:00Z
2
value 0.01644
scoring_system epss
scoring_elements 0.81999
published_at 2026-04-18T12:55:00Z
3
value 0.01644
scoring_system epss
scoring_elements 0.82001
published_at 2026-04-21T12:55:00Z
4
value 0.01644
scoring_system epss
scoring_elements 0.81908
published_at 2026-04-02T12:55:00Z
5
value 0.01644
scoring_system epss
scoring_elements 0.8193
published_at 2026-04-04T12:55:00Z
6
value 0.01644
scoring_system epss
scoring_elements 0.81927
published_at 2026-04-07T12:55:00Z
7
value 0.01644
scoring_system epss
scoring_elements 0.81953
published_at 2026-04-08T12:55:00Z
8
value 0.01644
scoring_system epss
scoring_elements 0.81961
published_at 2026-04-09T12:55:00Z
9
value 0.01644
scoring_system epss
scoring_elements 0.8198
published_at 2026-04-11T12:55:00Z
10
value 0.01644
scoring_system epss
scoring_elements 0.81969
published_at 2026-04-12T12:55:00Z
11
value 0.01644
scoring_system epss
scoring_elements 0.81964
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1574
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1011354
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1011354
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1061214
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1061214
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1061600
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1061600
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1064346
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1064346
17
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1072044
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1072044
18
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1072174
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1072174
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
27
reference_url http://secunia.com/advisories/61387
reference_id
reference_type
scores
url http://secunia.com/advisories/61387
28
reference_url http://secunia.com/advisories/61854
reference_id
reference_type
scores
url http://secunia.com/advisories/61854
29
reference_url http://secunia.com/advisories/62021
reference_id
reference_type
scores
url http://secunia.com/advisories/62021
30
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
31
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
32
reference_url http://www.debian.org/security/2014/dsa-3050
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3050
33
reference_url http://www.debian.org/security/2014/dsa-3061
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3061
34
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-74.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-74.html
35
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
36
reference_url http://www.securityfocus.com/bid/70436
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70436
37
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
38
reference_url http://www.securitytracker.com/id/1031030
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031030
39
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
40
reference_url http://www.ubuntu.com/usn/USN-2373-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2373-1
41
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152356
reference_id 1152356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152356
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1574
reference_id CVE-2014-1574
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1574
49
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-74
reference_id mfsa2014-74
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-74
51
reference_url https://access.redhat.com/errata/RHSA-2014:1635
reference_id RHSA-2014:1635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1635
52
reference_url https://access.redhat.com/errata/RHSA-2014:1647
reference_id RHSA-2014:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1647
53
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
54
reference_url https://usn.ubuntu.com/2373-1/
reference_id USN-2373-1
reference_type
scores
url https://usn.ubuntu.com/2373-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-1574
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjda-dm64-kqg2
13
url VCID-ct72-956e-qyef
vulnerability_id VCID-ct72-956e-qyef
summary
Paul Theriault of Mozilla discovered a privacy issue with a WiFi-related system
message that wasn't properly restricted to apps with the "wifi-manage" permission. As a result,
even unprivileged apps could have received those messages, allowing them to extract limited
information from a vulnerable Firefox OS device under certain rare conditions.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4494
reference_id
reference_type
scores
0
value 0.00263
scoring_system epss
scoring_elements 0.49673
published_at 2026-04-24T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49617
published_at 2026-04-01T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49646
published_at 2026-04-02T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49674
published_at 2026-04-04T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49626
published_at 2026-04-07T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49681
published_at 2026-04-08T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49675
published_at 2026-04-09T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49693
published_at 2026-04-11T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49664
published_at 2026-04-12T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49666
published_at 2026-04-13T12:55:00Z
10
value 0.00263
scoring_system epss
scoring_elements 0.49714
published_at 2026-04-16T12:55:00Z
11
value 0.00263
scoring_system epss
scoring_elements 0.49712
published_at 2026-04-18T12:55:00Z
12
value 0.00263
scoring_system epss
scoring_elements 0.49683
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4494
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4494
reference_id CVE-2015-4494
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4494
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-76
reference_id mfsa2015-76
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-76
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-4494
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ct72-956e-qyef
14
url VCID-dm6s-ammq-33dp
vulnerability_id VCID-dm6s-ammq-33dp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0825
reference_id
reference_type
scores
0
value 0.00664
scoring_system epss
scoring_elements 0.71279
published_at 2026-04-24T12:55:00Z
1
value 0.00664
scoring_system epss
scoring_elements 0.71146
published_at 2026-04-01T12:55:00Z
2
value 0.00664
scoring_system epss
scoring_elements 0.71156
published_at 2026-04-02T12:55:00Z
3
value 0.00664
scoring_system epss
scoring_elements 0.71174
published_at 2026-04-04T12:55:00Z
4
value 0.00664
scoring_system epss
scoring_elements 0.71149
published_at 2026-04-07T12:55:00Z
5
value 0.00664
scoring_system epss
scoring_elements 0.71191
published_at 2026-04-08T12:55:00Z
6
value 0.00664
scoring_system epss
scoring_elements 0.71204
published_at 2026-04-09T12:55:00Z
7
value 0.00664
scoring_system epss
scoring_elements 0.71226
published_at 2026-04-21T12:55:00Z
8
value 0.00664
scoring_system epss
scoring_elements 0.71212
published_at 2026-04-12T12:55:00Z
9
value 0.00664
scoring_system epss
scoring_elements 0.71196
published_at 2026-04-13T12:55:00Z
10
value 0.00664
scoring_system epss
scoring_elements 0.71242
published_at 2026-04-16T12:55:00Z
11
value 0.00664
scoring_system epss
scoring_elements 0.71249
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0825
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195631
reference_id 1195631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195631
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825
reference_id CVE-2015-0825
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-21
reference_id mfsa2015-21
reference_type
scores
0
value medium
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-21
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0825
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dm6s-ammq-33dp
15
url VCID-duj8-zd4h-u7at
vulnerability_id VCID-duj8-zd4h-u7at
summary
Security researcher Muneaki Nishimura reported an issue with Gaia's System app
which allows an attacker to inject HTML code into the System app's context via specially-crafted
search links. The injection occurs when the user opens such malicious link in the browser and then
presses the HOME button or uses the Show Windows function.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2745
reference_id
reference_type
scores
0
value 0.00322
scoring_system epss
scoring_elements 0.5522
published_at 2026-04-24T12:55:00Z
1
value 0.00322
scoring_system epss
scoring_elements 0.55136
published_at 2026-04-01T12:55:00Z
2
value 0.00322
scoring_system epss
scoring_elements 0.55237
published_at 2026-04-02T12:55:00Z
3
value 0.00322
scoring_system epss
scoring_elements 0.5526
published_at 2026-04-04T12:55:00Z
4
value 0.00322
scoring_system epss
scoring_elements 0.55239
published_at 2026-04-07T12:55:00Z
5
value 0.00322
scoring_system epss
scoring_elements 0.55289
published_at 2026-04-08T12:55:00Z
6
value 0.00322
scoring_system epss
scoring_elements 0.5529
published_at 2026-04-09T12:55:00Z
7
value 0.00322
scoring_system epss
scoring_elements 0.55301
published_at 2026-04-16T12:55:00Z
8
value 0.00322
scoring_system epss
scoring_elements 0.55281
published_at 2026-04-12T12:55:00Z
9
value 0.00322
scoring_system epss
scoring_elements 0.55262
published_at 2026-04-13T12:55:00Z
10
value 0.00322
scoring_system epss
scoring_elements 0.55304
published_at 2026-04-18T12:55:00Z
11
value 0.00322
scoring_system epss
scoring_elements 0.55283
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2745
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2745
reference_id CVE-2015-2745
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2745
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-73
reference_id mfsa2015-73
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-73
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2745
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-duj8-zd4h-u7at
16
url VCID-e193-1kgh-5kda
vulnerability_id VCID-e193-1kgh-5kda
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0805
reference_id
reference_type
scores
0
value 0.01674
scoring_system epss
scoring_elements 0.82207
published_at 2026-04-24T12:55:00Z
1
value 0.01674
scoring_system epss
scoring_elements 0.82076
published_at 2026-04-01T12:55:00Z
2
value 0.01674
scoring_system epss
scoring_elements 0.82088
published_at 2026-04-02T12:55:00Z
3
value 0.01674
scoring_system epss
scoring_elements 0.82109
published_at 2026-04-04T12:55:00Z
4
value 0.01674
scoring_system epss
scoring_elements 0.82105
published_at 2026-04-07T12:55:00Z
5
value 0.01674
scoring_system epss
scoring_elements 0.82132
published_at 2026-04-08T12:55:00Z
6
value 0.01674
scoring_system epss
scoring_elements 0.82139
published_at 2026-04-09T12:55:00Z
7
value 0.01674
scoring_system epss
scoring_elements 0.82158
published_at 2026-04-11T12:55:00Z
8
value 0.01674
scoring_system epss
scoring_elements 0.82149
published_at 2026-04-12T12:55:00Z
9
value 0.01674
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-13T12:55:00Z
10
value 0.01674
scoring_system epss
scoring_elements 0.82181
published_at 2026-04-18T12:55:00Z
11
value 0.01674
scoring_system epss
scoring_elements 0.82184
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0805
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207078
reference_id 1207078
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207078
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805
reference_id CVE-2015-0805
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-38
reference_id mfsa2015-38
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-38
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0805
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e193-1kgh-5kda
17
url VCID-e1ef-b4f7-7yd8
vulnerability_id VCID-e1ef-b4f7-7yd8
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1594.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1594.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1594
reference_id
reference_type
scores
0
value 0.01693
scoring_system epss
scoring_elements 0.82312
published_at 2026-04-24T12:55:00Z
1
value 0.01693
scoring_system epss
scoring_elements 0.82183
published_at 2026-04-01T12:55:00Z
2
value 0.01693
scoring_system epss
scoring_elements 0.82289
published_at 2026-04-18T12:55:00Z
3
value 0.01693
scoring_system epss
scoring_elements 0.82291
published_at 2026-04-21T12:55:00Z
4
value 0.01693
scoring_system epss
scoring_elements 0.82197
published_at 2026-04-02T12:55:00Z
5
value 0.01693
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-04T12:55:00Z
6
value 0.01693
scoring_system epss
scoring_elements 0.82213
published_at 2026-04-07T12:55:00Z
7
value 0.01693
scoring_system epss
scoring_elements 0.82239
published_at 2026-04-08T12:55:00Z
8
value 0.01693
scoring_system epss
scoring_elements 0.82247
published_at 2026-04-09T12:55:00Z
9
value 0.01693
scoring_system epss
scoring_elements 0.82266
published_at 2026-04-11T12:55:00Z
10
value 0.01693
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-12T12:55:00Z
11
value 0.01693
scoring_system epss
scoring_elements 0.82253
published_at 2026-04-13T12:55:00Z
12
value 0.01693
scoring_system epss
scoring_elements 0.8229
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1594
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1074280
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1074280
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
11
reference_url http://www.debian.org/security/2014/dsa-3090
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3090
12
reference_url http://www.debian.org/security/2014/dsa-3092
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3092
13
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-89.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-89.html
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
15
reference_url http://www.securityfocus.com/bid/71396
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71396
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169210
reference_id 1169210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169210
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1594
reference_id CVE-2014-1594
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1594
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-89
reference_id mfsa2014-89
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-89
23
reference_url https://access.redhat.com/errata/RHSA-2014:1919
reference_id RHSA-2014:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1919
24
reference_url https://access.redhat.com/errata/RHSA-2014:1924
reference_id RHSA-2014:1924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1924
25
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
26
reference_url https://usn.ubuntu.com/2428-1/
reference_id USN-2428-1
reference_type
scores
url https://usn.ubuntu.com/2428-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-1594
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1ef-b4f7-7yd8
18
url VCID-ep8z-jvbx-rqcj
vulnerability_id VCID-ep8z-jvbx-rqcj
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0836
reference_id
reference_type
scores
0
value 0.01493
scoring_system epss
scoring_elements 0.81126
published_at 2026-04-24T12:55:00Z
1
value 0.01493
scoring_system epss
scoring_elements 0.81002
published_at 2026-04-01T12:55:00Z
2
value 0.01493
scoring_system epss
scoring_elements 0.81011
published_at 2026-04-02T12:55:00Z
3
value 0.01493
scoring_system epss
scoring_elements 0.81035
published_at 2026-04-04T12:55:00Z
4
value 0.01493
scoring_system epss
scoring_elements 0.81034
published_at 2026-04-07T12:55:00Z
5
value 0.01493
scoring_system epss
scoring_elements 0.81062
published_at 2026-04-08T12:55:00Z
6
value 0.01493
scoring_system epss
scoring_elements 0.81068
published_at 2026-04-09T12:55:00Z
7
value 0.01493
scoring_system epss
scoring_elements 0.81086
published_at 2026-04-11T12:55:00Z
8
value 0.01493
scoring_system epss
scoring_elements 0.81072
published_at 2026-04-12T12:55:00Z
9
value 0.01493
scoring_system epss
scoring_elements 0.81065
published_at 2026-04-13T12:55:00Z
10
value 0.01493
scoring_system epss
scoring_elements 0.81103
published_at 2026-04-21T12:55:00Z
11
value 0.01493
scoring_system epss
scoring_elements 0.81105
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0836
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195605
reference_id 1195605
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195605
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-11
reference_id mfsa2015-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-11
9
reference_url https://access.redhat.com/errata/RHSA-2015:0265
reference_id RHSA-2015:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0265
10
reference_url https://access.redhat.com/errata/RHSA-2015:0266
reference_id RHSA-2015:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0266
11
reference_url https://access.redhat.com/errata/RHSA-2015:0629
reference_id RHSA-2015:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0629
12
reference_url https://access.redhat.com/errata/RHSA-2015:0642
reference_id RHSA-2015:0642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0642
13
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
14
reference_url https://usn.ubuntu.com/2506-1/
reference_id USN-2506-1
reference_type
scores
url https://usn.ubuntu.com/2506-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0836
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ep8z-jvbx-rqcj
19
url VCID-f1nz-g5h1-m7dm
vulnerability_id VCID-f1nz-g5h1-m7dm
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8638.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8638.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8638
reference_id
reference_type
scores
0
value 0.00496
scoring_system epss
scoring_elements 0.65834
published_at 2026-04-21T12:55:00Z
1
value 0.00496
scoring_system epss
scoring_elements 0.65713
published_at 2026-04-01T12:55:00Z
2
value 0.00496
scoring_system epss
scoring_elements 0.65763
published_at 2026-04-02T12:55:00Z
3
value 0.00496
scoring_system epss
scoring_elements 0.65793
published_at 2026-04-04T12:55:00Z
4
value 0.00496
scoring_system epss
scoring_elements 0.65758
published_at 2026-04-07T12:55:00Z
5
value 0.00496
scoring_system epss
scoring_elements 0.65811
published_at 2026-04-08T12:55:00Z
6
value 0.00496
scoring_system epss
scoring_elements 0.65822
published_at 2026-04-09T12:55:00Z
7
value 0.00496
scoring_system epss
scoring_elements 0.65842
published_at 2026-04-11T12:55:00Z
8
value 0.00496
scoring_system epss
scoring_elements 0.65828
published_at 2026-04-12T12:55:00Z
9
value 0.00496
scoring_system epss
scoring_elements 0.65798
published_at 2026-04-13T12:55:00Z
10
value 0.00496
scoring_system epss
scoring_elements 0.65832
published_at 2026-04-16T12:55:00Z
11
value 0.00496
scoring_system epss
scoring_elements 0.65846
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8638
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180966
reference_id 1180966
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180966
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-03
reference_id mfsa2015-03
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-03
9
reference_url https://access.redhat.com/errata/RHSA-2015:0046
reference_id RHSA-2015:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0046
10
reference_url https://access.redhat.com/errata/RHSA-2015:0047
reference_id RHSA-2015:0047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0047
11
reference_url https://usn.ubuntu.com/2458-1/
reference_id USN-2458-1
reference_type
scores
url https://usn.ubuntu.com/2458-1/
12
reference_url https://usn.ubuntu.com/2460-1/
reference_id USN-2460-1
reference_type
scores
url https://usn.ubuntu.com/2460-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-8638
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f1nz-g5h1-m7dm
20
url VCID-fasa-11uc-jucq
vulnerability_id VCID-fasa-11uc-jucq
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4495.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4495
reference_id
reference_type
scores
0
value 0.71568
scoring_system epss
scoring_elements 0.9873
published_at 2026-04-12T12:55:00Z
1
value 0.71568
scoring_system epss
scoring_elements 0.98731
published_at 2026-04-13T12:55:00Z
2
value 0.71568
scoring_system epss
scoring_elements 0.98733
published_at 2026-04-16T12:55:00Z
3
value 0.71568
scoring_system epss
scoring_elements 0.98734
published_at 2026-04-21T12:55:00Z
4
value 0.71568
scoring_system epss
scoring_elements 0.98739
published_at 2026-04-24T12:55:00Z
5
value 0.71568
scoring_system epss
scoring_elements 0.98719
published_at 2026-04-02T12:55:00Z
6
value 0.71568
scoring_system epss
scoring_elements 0.98727
published_at 2026-04-09T12:55:00Z
7
value 0.71568
scoring_system epss
scoring_elements 0.98718
published_at 2026-04-01T12:55:00Z
8
value 0.71568
scoring_system epss
scoring_elements 0.98723
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4495
2
reference_url http://www.securitytracker.com/id/1033216
reference_id 1033216
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://www.securitytracker.com/id/1033216
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1251318
reference_id 1251318
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1251318
4
reference_url https://www.exploit-db.com/exploits/37772/
reference_id 37772
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url https://www.exploit-db.com/exploits/37772/
5
reference_url http://www.securityfocus.com/bid/76249
reference_id 76249
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://www.securityfocus.com/bid/76249
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495
reference_id CVE-2015-4495
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/37772.js
reference_id CVE-2015-4495;OSVDB-125839
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/37772.js
8
reference_url https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/
reference_id firefox-exploit-found-in-the-wild
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/
9
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url https://security.gentoo.org/glsa/201512-10
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-78
reference_id mfsa2015-78
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-78
11
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-78.html
reference_id mfsa2015-78.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://www.mozilla.org/security/announce/2015/mfsa2015-78.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html
reference_id msg00009.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html
14
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html
15
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html
reference_id msg00016.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html
17
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html
18
reference_url https://access.redhat.com/errata/RHSA-2015:1581
reference_id RHSA-2015:1581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1581
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-1581.html
reference_id RHSA-2015-1581.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://rhn.redhat.com/errata/RHSA-2015-1581.html
20
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1178058
reference_id show_bug.cgi?id=1178058
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1178058
21
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1179262
reference_id show_bug.cgi?id=1179262
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1179262
22
reference_url https://usn.ubuntu.com/2707-1/
reference_id USN-2707-1
reference_type
scores
url https://usn.ubuntu.com/2707-1/
23
reference_url http://www.ubuntu.com/usn/USN-2707-1
reference_id USN-2707-1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://www.ubuntu.com/usn/USN-2707-1
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-4495
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fasa-11uc-jucq
21
url VCID-ffrc-3bx6-jbav
vulnerability_id VCID-ffrc-3bx6-jbav
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0801
reference_id
reference_type
scores
0
value 0.01191
scoring_system epss
scoring_elements 0.78895
published_at 2026-04-24T12:55:00Z
1
value 0.01191
scoring_system epss
scoring_elements 0.78795
published_at 2026-04-01T12:55:00Z
2
value 0.01191
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-02T12:55:00Z
3
value 0.01191
scoring_system epss
scoring_elements 0.78832
published_at 2026-04-04T12:55:00Z
4
value 0.01191
scoring_system epss
scoring_elements 0.78815
published_at 2026-04-07T12:55:00Z
5
value 0.01191
scoring_system epss
scoring_elements 0.7884
published_at 2026-04-08T12:55:00Z
6
value 0.01191
scoring_system epss
scoring_elements 0.78846
published_at 2026-04-09T12:55:00Z
7
value 0.01191
scoring_system epss
scoring_elements 0.7887
published_at 2026-04-11T12:55:00Z
8
value 0.01191
scoring_system epss
scoring_elements 0.78853
published_at 2026-04-12T12:55:00Z
9
value 0.01191
scoring_system epss
scoring_elements 0.78843
published_at 2026-04-13T12:55:00Z
10
value 0.01191
scoring_system epss
scoring_elements 0.78872
published_at 2026-04-16T12:55:00Z
11
value 0.01191
scoring_system epss
scoring_elements 0.78869
published_at 2026-04-18T12:55:00Z
12
value 0.01191
scoring_system epss
scoring_elements 0.78867
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0801
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207084
reference_id 1207084
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207084
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-40
reference_id mfsa2015-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-40
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0801
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ffrc-3bx6-jbav
22
url VCID-ghtc-dh9g-2ufb
vulnerability_id VCID-ghtc-dh9g-2ufb
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2708
reference_id
reference_type
scores
0
value 0.01328
scoring_system epss
scoring_elements 0.79993
published_at 2026-04-24T12:55:00Z
1
value 0.01328
scoring_system epss
scoring_elements 0.79885
published_at 2026-04-01T12:55:00Z
2
value 0.01328
scoring_system epss
scoring_elements 0.79892
published_at 2026-04-02T12:55:00Z
3
value 0.01328
scoring_system epss
scoring_elements 0.79913
published_at 2026-04-04T12:55:00Z
4
value 0.01328
scoring_system epss
scoring_elements 0.79901
published_at 2026-04-07T12:55:00Z
5
value 0.01328
scoring_system epss
scoring_elements 0.79929
published_at 2026-04-08T12:55:00Z
6
value 0.01328
scoring_system epss
scoring_elements 0.79938
published_at 2026-04-09T12:55:00Z
7
value 0.01328
scoring_system epss
scoring_elements 0.79958
published_at 2026-04-11T12:55:00Z
8
value 0.01328
scoring_system epss
scoring_elements 0.79941
published_at 2026-04-12T12:55:00Z
9
value 0.01328
scoring_system epss
scoring_elements 0.79934
published_at 2026-04-13T12:55:00Z
10
value 0.01328
scoring_system epss
scoring_elements 0.79962
published_at 2026-04-18T12:55:00Z
11
value 0.01328
scoring_system epss
scoring_elements 0.79965
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2708
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220597
reference_id 1220597
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220597
9
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-46
reference_id mfsa2015-46
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-46
11
reference_url https://access.redhat.com/errata/RHSA-2015:0988
reference_id RHSA-2015:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0988
12
reference_url https://access.redhat.com/errata/RHSA-2015:1012
reference_id RHSA-2015:1012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1012
13
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
14
reference_url https://usn.ubuntu.com/2603-1/
reference_id USN-2603-1
reference_type
scores
url https://usn.ubuntu.com/2603-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2708
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ghtc-dh9g-2ufb
23
url VCID-gr7k-2v4p-kbfg
vulnerability_id VCID-gr7k-2v4p-kbfg
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0816
reference_id
reference_type
scores
0
value 0.8537
scoring_system epss
scoring_elements 0.99369
published_at 2026-04-24T12:55:00Z
1
value 0.8537
scoring_system epss
scoring_elements 0.99359
published_at 2026-04-02T12:55:00Z
2
value 0.8537
scoring_system epss
scoring_elements 0.99361
published_at 2026-04-04T12:55:00Z
3
value 0.8537
scoring_system epss
scoring_elements 0.99363
published_at 2026-04-08T12:55:00Z
4
value 0.8537
scoring_system epss
scoring_elements 0.99364
published_at 2026-04-09T12:55:00Z
5
value 0.8537
scoring_system epss
scoring_elements 0.99365
published_at 2026-04-11T12:55:00Z
6
value 0.8537
scoring_system epss
scoring_elements 0.99366
published_at 2026-04-13T12:55:00Z
7
value 0.8537
scoring_system epss
scoring_elements 0.99368
published_at 2026-04-18T12:55:00Z
8
value 0.8537
scoring_system epss
scoring_elements 0.99367
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207072
reference_id 1207072
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207072
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-33
reference_id mfsa2015-33
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-33
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0816
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gr7k-2v4p-kbfg
24
url VCID-grdt-g3kf-3uh3
vulnerability_id VCID-grdt-g3kf-3uh3
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0815
reference_id
reference_type
scores
0
value 0.01254
scoring_system epss
scoring_elements 0.79428
published_at 2026-04-24T12:55:00Z
1
value 0.01254
scoring_system epss
scoring_elements 0.79314
published_at 2026-04-01T12:55:00Z
2
value 0.01254
scoring_system epss
scoring_elements 0.79321
published_at 2026-04-02T12:55:00Z
3
value 0.01254
scoring_system epss
scoring_elements 0.79344
published_at 2026-04-04T12:55:00Z
4
value 0.01254
scoring_system epss
scoring_elements 0.7933
published_at 2026-04-07T12:55:00Z
5
value 0.01254
scoring_system epss
scoring_elements 0.79356
published_at 2026-04-08T12:55:00Z
6
value 0.01254
scoring_system epss
scoring_elements 0.79365
published_at 2026-04-09T12:55:00Z
7
value 0.01254
scoring_system epss
scoring_elements 0.79389
published_at 2026-04-11T12:55:00Z
8
value 0.01254
scoring_system epss
scoring_elements 0.79373
published_at 2026-04-12T12:55:00Z
9
value 0.01254
scoring_system epss
scoring_elements 0.79362
published_at 2026-04-13T12:55:00Z
10
value 0.01254
scoring_system epss
scoring_elements 0.79394
published_at 2026-04-16T12:55:00Z
11
value 0.01254
scoring_system epss
scoring_elements 0.79392
published_at 2026-04-18T12:55:00Z
12
value 0.01254
scoring_system epss
scoring_elements 0.79395
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0815
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207068
reference_id 1207068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207068
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-30
reference_id mfsa2015-30
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-30
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0815
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-grdt-g3kf-3uh3
25
url VCID-gx4v-yve4-gbga
vulnerability_id VCID-gx4v-yve4-gbga
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8640.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8640
reference_id
reference_type
scores
0
value 0.0114
scoring_system epss
scoring_elements 0.78438
published_at 2026-04-11T12:55:00Z
1
value 0.0114
scoring_system epss
scoring_elements 0.78359
published_at 2026-04-01T12:55:00Z
2
value 0.0114
scoring_system epss
scoring_elements 0.78366
published_at 2026-04-02T12:55:00Z
3
value 0.0114
scoring_system epss
scoring_elements 0.78397
published_at 2026-04-04T12:55:00Z
4
value 0.0114
scoring_system epss
scoring_elements 0.7838
published_at 2026-04-07T12:55:00Z
5
value 0.0114
scoring_system epss
scoring_elements 0.78407
published_at 2026-04-08T12:55:00Z
6
value 0.0114
scoring_system epss
scoring_elements 0.78412
published_at 2026-04-09T12:55:00Z
7
value 0.01542
scoring_system epss
scoring_elements 0.81433
published_at 2026-04-24T12:55:00Z
8
value 0.01542
scoring_system epss
scoring_elements 0.81381
published_at 2026-04-12T12:55:00Z
9
value 0.01542
scoring_system epss
scoring_elements 0.81374
published_at 2026-04-13T12:55:00Z
10
value 0.01542
scoring_system epss
scoring_elements 0.81411
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8640
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180970
reference_id 1180970
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180970
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640
reference_id CVE-2014-8640
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-05
reference_id mfsa2015-05
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-05
6
reference_url https://usn.ubuntu.com/2458-1/
reference_id USN-2458-1
reference_type
scores
url https://usn.ubuntu.com/2458-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-8640
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gx4v-yve4-gbga
26
url VCID-hb1k-vzww-8bbm
vulnerability_id VCID-hb1k-vzww-8bbm
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1635.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1635.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1647.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1647.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1581.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1581.json
11
reference_url https://advisories.mageia.org/MGASA-2014-0421.html
reference_id
reference_type
scores
url https://advisories.mageia.org/MGASA-2014-0421.html
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1581
reference_id
reference_type
scores
0
value 0.02306
scoring_system epss
scoring_elements 0.848
published_at 2026-04-24T12:55:00Z
1
value 0.02306
scoring_system epss
scoring_elements 0.84678
published_at 2026-04-01T12:55:00Z
2
value 0.02306
scoring_system epss
scoring_elements 0.84775
published_at 2026-04-18T12:55:00Z
3
value 0.02306
scoring_system epss
scoring_elements 0.84773
published_at 2026-04-21T12:55:00Z
4
value 0.02306
scoring_system epss
scoring_elements 0.84693
published_at 2026-04-02T12:55:00Z
5
value 0.02306
scoring_system epss
scoring_elements 0.84713
published_at 2026-04-04T12:55:00Z
6
value 0.02306
scoring_system epss
scoring_elements 0.84715
published_at 2026-04-07T12:55:00Z
7
value 0.02306
scoring_system epss
scoring_elements 0.84737
published_at 2026-04-08T12:55:00Z
8
value 0.02306
scoring_system epss
scoring_elements 0.84744
published_at 2026-04-09T12:55:00Z
9
value 0.02306
scoring_system epss
scoring_elements 0.84762
published_at 2026-04-11T12:55:00Z
10
value 0.02306
scoring_system epss
scoring_elements 0.84758
published_at 2026-04-12T12:55:00Z
11
value 0.02306
scoring_system epss
scoring_elements 0.84752
published_at 2026-04-13T12:55:00Z
12
value 0.02306
scoring_system epss
scoring_elements 0.84774
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1581
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1068218
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1068218
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
22
reference_url http://secunia.com/advisories/61387
reference_id
reference_type
scores
url http://secunia.com/advisories/61387
23
reference_url http://secunia.com/advisories/61854
reference_id
reference_type
scores
url http://secunia.com/advisories/61854
24
reference_url http://secunia.com/advisories/62021
reference_id
reference_type
scores
url http://secunia.com/advisories/62021
25
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
26
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
27
reference_url http://www.debian.org/security/2014/dsa-3050
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3050
28
reference_url http://www.debian.org/security/2014/dsa-3061
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3061
29
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-79.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-79.html
30
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
31
reference_url http://www.securityfocus.com/bid/70426
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70426
32
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
33
reference_url http://www.securitytracker.com/id/1031030
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031030
34
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
35
reference_url http://www.ubuntu.com/usn/USN-2373-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2373-1
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152363
reference_id 1152363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152363
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1581
reference_id CVE-2014-1581
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1581
44
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
45
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-79
reference_id mfsa2014-79
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-79
46
reference_url https://access.redhat.com/errata/RHSA-2014:1635
reference_id RHSA-2014:1635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1635
47
reference_url https://access.redhat.com/errata/RHSA-2014:1647
reference_id RHSA-2014:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1647
48
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
49
reference_url https://usn.ubuntu.com/2373-1/
reference_id USN-2373-1
reference_type
scores
url https://usn.ubuntu.com/2373-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-1581
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hb1k-vzww-8bbm
27
url VCID-jj3q-bub2-y3b2
vulnerability_id VCID-jj3q-bub2-y3b2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0822
reference_id
reference_type
scores
0
value 0.00637
scoring_system epss
scoring_elements 0.70549
published_at 2026-04-24T12:55:00Z
1
value 0.00637
scoring_system epss
scoring_elements 0.70403
published_at 2026-04-01T12:55:00Z
2
value 0.00637
scoring_system epss
scoring_elements 0.70417
published_at 2026-04-02T12:55:00Z
3
value 0.00637
scoring_system epss
scoring_elements 0.70434
published_at 2026-04-04T12:55:00Z
4
value 0.00637
scoring_system epss
scoring_elements 0.70413
published_at 2026-04-07T12:55:00Z
5
value 0.00637
scoring_system epss
scoring_elements 0.70458
published_at 2026-04-08T12:55:00Z
6
value 0.00637
scoring_system epss
scoring_elements 0.70474
published_at 2026-04-09T12:55:00Z
7
value 0.00637
scoring_system epss
scoring_elements 0.70498
published_at 2026-04-21T12:55:00Z
8
value 0.00637
scoring_system epss
scoring_elements 0.70483
published_at 2026-04-12T12:55:00Z
9
value 0.00637
scoring_system epss
scoring_elements 0.70468
published_at 2026-04-13T12:55:00Z
10
value 0.00637
scoring_system epss
scoring_elements 0.70511
published_at 2026-04-16T12:55:00Z
11
value 0.00637
scoring_system epss
scoring_elements 0.70519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0822
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195638
reference_id 1195638
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195638
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-24
reference_id mfsa2015-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-24
9
reference_url https://access.redhat.com/errata/RHSA-2015:0265
reference_id RHSA-2015:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0265
10
reference_url https://access.redhat.com/errata/RHSA-2015:0266
reference_id RHSA-2015:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0266
11
reference_url https://access.redhat.com/errata/RHSA-2015:0629
reference_id RHSA-2015:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0629
12
reference_url https://access.redhat.com/errata/RHSA-2015:0642
reference_id RHSA-2015:0642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0642
13
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
14
reference_url https://usn.ubuntu.com/2506-1/
reference_id USN-2506-1
reference_type
scores
url https://usn.ubuntu.com/2506-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0822
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jj3q-bub2-y3b2
28
url VCID-jmhk-12t1-kugh
vulnerability_id VCID-jmhk-12t1-kugh
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2730
reference_id
reference_type
scores
0
value 0.00228
scoring_system epss
scoring_elements 0.45443
published_at 2026-04-24T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.4544
published_at 2026-04-01T12:55:00Z
2
value 0.00228
scoring_system epss
scoring_elements 0.45514
published_at 2026-04-02T12:55:00Z
3
value 0.00228
scoring_system epss
scoring_elements 0.45536
published_at 2026-04-04T12:55:00Z
4
value 0.00228
scoring_system epss
scoring_elements 0.45482
published_at 2026-04-07T12:55:00Z
5
value 0.00228
scoring_system epss
scoring_elements 0.45537
published_at 2026-04-08T12:55:00Z
6
value 0.00228
scoring_system epss
scoring_elements 0.45538
published_at 2026-04-09T12:55:00Z
7
value 0.00228
scoring_system epss
scoring_elements 0.45558
published_at 2026-04-11T12:55:00Z
8
value 0.00228
scoring_system epss
scoring_elements 0.45527
published_at 2026-04-12T12:55:00Z
9
value 0.00228
scoring_system epss
scoring_elements 0.45533
published_at 2026-04-13T12:55:00Z
10
value 0.00228
scoring_system epss
scoring_elements 0.45581
published_at 2026-04-16T12:55:00Z
11
value 0.00228
scoring_system epss
scoring_elements 0.45578
published_at 2026-04-18T12:55:00Z
12
value 0.00228
scoring_system epss
scoring_elements 0.45529
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236954
reference_id 1236954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236954
5
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-64
reference_id mfsa2015-64
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-64
7
reference_url https://access.redhat.com/errata/RHSA-2015:1664
reference_id RHSA-2015:1664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1664
8
reference_url https://access.redhat.com/errata/RHSA-2015:1699
reference_id RHSA-2015:1699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1699
9
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
10
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
11
reference_url https://usn.ubuntu.com/2672-1/
reference_id USN-2672-1
reference_type
scores
url https://usn.ubuntu.com/2672-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2730
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jmhk-12t1-kugh
29
url VCID-jnj4-g593-37d7
vulnerability_id VCID-jnj4-g593-37d7
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0811
reference_id
reference_type
scores
0
value 0.00765
scoring_system epss
scoring_elements 0.73513
published_at 2026-04-24T12:55:00Z
1
value 0.00765
scoring_system epss
scoring_elements 0.73385
published_at 2026-04-01T12:55:00Z
2
value 0.00765
scoring_system epss
scoring_elements 0.73394
published_at 2026-04-02T12:55:00Z
3
value 0.00765
scoring_system epss
scoring_elements 0.73417
published_at 2026-04-04T12:55:00Z
4
value 0.00765
scoring_system epss
scoring_elements 0.73389
published_at 2026-04-07T12:55:00Z
5
value 0.00765
scoring_system epss
scoring_elements 0.73426
published_at 2026-04-08T12:55:00Z
6
value 0.00765
scoring_system epss
scoring_elements 0.7344
published_at 2026-04-09T12:55:00Z
7
value 0.00765
scoring_system epss
scoring_elements 0.73463
published_at 2026-04-11T12:55:00Z
8
value 0.00765
scoring_system epss
scoring_elements 0.73443
published_at 2026-04-12T12:55:00Z
9
value 0.00765
scoring_system epss
scoring_elements 0.73435
published_at 2026-04-13T12:55:00Z
10
value 0.00765
scoring_system epss
scoring_elements 0.73478
published_at 2026-04-16T12:55:00Z
11
value 0.00765
scoring_system epss
scoring_elements 0.73487
published_at 2026-04-18T12:55:00Z
12
value 0.00765
scoring_system epss
scoring_elements 0.7348
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0811
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207073
reference_id 1207073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207073
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811
reference_id CVE-2015-0811
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-34
reference_id mfsa2015-34
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-34
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0811
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jnj4-g593-37d7
30
url VCID-k69z-4hzh-5yd4
vulnerability_id VCID-k69z-4hzh-5yd4
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0827
reference_id
reference_type
scores
0
value 0.00997
scoring_system epss
scoring_elements 0.77021
published_at 2026-04-24T12:55:00Z
1
value 0.00997
scoring_system epss
scoring_elements 0.76886
published_at 2026-04-01T12:55:00Z
2
value 0.00997
scoring_system epss
scoring_elements 0.76893
published_at 2026-04-02T12:55:00Z
3
value 0.00997
scoring_system epss
scoring_elements 0.76923
published_at 2026-04-04T12:55:00Z
4
value 0.00997
scoring_system epss
scoring_elements 0.76905
published_at 2026-04-07T12:55:00Z
5
value 0.00997
scoring_system epss
scoring_elements 0.76937
published_at 2026-04-08T12:55:00Z
6
value 0.00997
scoring_system epss
scoring_elements 0.76948
published_at 2026-04-09T12:55:00Z
7
value 0.00997
scoring_system epss
scoring_elements 0.76976
published_at 2026-04-11T12:55:00Z
8
value 0.00997
scoring_system epss
scoring_elements 0.76955
published_at 2026-04-12T12:55:00Z
9
value 0.00997
scoring_system epss
scoring_elements 0.76951
published_at 2026-04-13T12:55:00Z
10
value 0.00997
scoring_system epss
scoring_elements 0.76992
published_at 2026-04-16T12:55:00Z
11
value 0.00997
scoring_system epss
scoring_elements 0.76994
published_at 2026-04-18T12:55:00Z
12
value 0.00997
scoring_system epss
scoring_elements 0.76987
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0827
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195623
reference_id 1195623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195623
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-19
reference_id mfsa2015-19
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-19
9
reference_url https://access.redhat.com/errata/RHSA-2015:0265
reference_id RHSA-2015:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0265
10
reference_url https://access.redhat.com/errata/RHSA-2015:0266
reference_id RHSA-2015:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0266
11
reference_url https://access.redhat.com/errata/RHSA-2015:0629
reference_id RHSA-2015:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0629
12
reference_url https://access.redhat.com/errata/RHSA-2015:0642
reference_id RHSA-2015:0642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0642
13
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
14
reference_url https://usn.ubuntu.com/2506-1/
reference_id USN-2506-1
reference_type
scores
url https://usn.ubuntu.com/2506-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0827
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k69z-4hzh-5yd4
31
url VCID-kyhs-j9aj-vqft
vulnerability_id VCID-kyhs-j9aj-vqft
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2734
reference_id
reference_type
scores
0
value 0.01252
scoring_system epss
scoring_elements 0.79399
published_at 2026-04-24T12:55:00Z
1
value 0.01252
scoring_system epss
scoring_elements 0.79293
published_at 2026-04-01T12:55:00Z
2
value 0.01252
scoring_system epss
scoring_elements 0.793
published_at 2026-04-02T12:55:00Z
3
value 0.01252
scoring_system epss
scoring_elements 0.79324
published_at 2026-04-04T12:55:00Z
4
value 0.01252
scoring_system epss
scoring_elements 0.7931
published_at 2026-04-07T12:55:00Z
5
value 0.01252
scoring_system epss
scoring_elements 0.79335
published_at 2026-04-08T12:55:00Z
6
value 0.01252
scoring_system epss
scoring_elements 0.79345
published_at 2026-04-09T12:55:00Z
7
value 0.01252
scoring_system epss
scoring_elements 0.79369
published_at 2026-04-11T12:55:00Z
8
value 0.01252
scoring_system epss
scoring_elements 0.79353
published_at 2026-04-12T12:55:00Z
9
value 0.01252
scoring_system epss
scoring_elements 0.79343
published_at 2026-04-13T12:55:00Z
10
value 0.01252
scoring_system epss
scoring_elements 0.7937
published_at 2026-04-16T12:55:00Z
11
value 0.01252
scoring_system epss
scoring_elements 0.79365
published_at 2026-04-18T12:55:00Z
12
value 0.01252
scoring_system epss
scoring_elements 0.79367
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2734
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
reference_id 1236956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
reference_id mfsa2015-66
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
22
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2734
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kyhs-j9aj-vqft
32
url VCID-mwyu-5rk2-xbbz
vulnerability_id VCID-mwyu-5rk2-xbbz
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2721
reference_id
reference_type
scores
0
value 0.00607
scoring_system epss
scoring_elements 0.69758
published_at 2026-04-24T12:55:00Z
1
value 0.00607
scoring_system epss
scoring_elements 0.69606
published_at 2026-04-01T12:55:00Z
2
value 0.00607
scoring_system epss
scoring_elements 0.69619
published_at 2026-04-02T12:55:00Z
3
value 0.00607
scoring_system epss
scoring_elements 0.69635
published_at 2026-04-04T12:55:00Z
4
value 0.00607
scoring_system epss
scoring_elements 0.69614
published_at 2026-04-07T12:55:00Z
5
value 0.00607
scoring_system epss
scoring_elements 0.69665
published_at 2026-04-08T12:55:00Z
6
value 0.00607
scoring_system epss
scoring_elements 0.69682
published_at 2026-04-09T12:55:00Z
7
value 0.00607
scoring_system epss
scoring_elements 0.69704
published_at 2026-04-11T12:55:00Z
8
value 0.00607
scoring_system epss
scoring_elements 0.69689
published_at 2026-04-12T12:55:00Z
9
value 0.00607
scoring_system epss
scoring_elements 0.69676
published_at 2026-04-13T12:55:00Z
10
value 0.00607
scoring_system epss
scoring_elements 0.69717
published_at 2026-04-16T12:55:00Z
11
value 0.00607
scoring_system epss
scoring_elements 0.69725
published_at 2026-04-18T12:55:00Z
12
value 0.00607
scoring_system epss
scoring_elements 0.69706
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236967
reference_id 1236967
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236967
17
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
18
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
19
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-71
reference_id mfsa2015-71
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-71
21
reference_url https://access.redhat.com/errata/RHSA-2015:1185
reference_id RHSA-2015:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1185
22
reference_url https://access.redhat.com/errata/RHSA-2015:1664
reference_id RHSA-2015:1664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1664
23
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
24
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
25
reference_url https://usn.ubuntu.com/2672-1/
reference_id USN-2672-1
reference_type
scores
url https://usn.ubuntu.com/2672-1/
26
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2721
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwyu-5rk2-xbbz
33
url VCID-nav6-hsaf-2fbj
vulnerability_id VCID-nav6-hsaf-2fbj
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2715
reference_id
reference_type
scores
0
value 0.01381
scoring_system epss
scoring_elements 0.80337
published_at 2026-04-24T12:55:00Z
1
value 0.01381
scoring_system epss
scoring_elements 0.80224
published_at 2026-04-01T12:55:00Z
2
value 0.01381
scoring_system epss
scoring_elements 0.80232
published_at 2026-04-02T12:55:00Z
3
value 0.01381
scoring_system epss
scoring_elements 0.80252
published_at 2026-04-04T12:55:00Z
4
value 0.01381
scoring_system epss
scoring_elements 0.8024
published_at 2026-04-07T12:55:00Z
5
value 0.01381
scoring_system epss
scoring_elements 0.80268
published_at 2026-04-08T12:55:00Z
6
value 0.01381
scoring_system epss
scoring_elements 0.80278
published_at 2026-04-09T12:55:00Z
7
value 0.01381
scoring_system epss
scoring_elements 0.80297
published_at 2026-04-11T12:55:00Z
8
value 0.01381
scoring_system epss
scoring_elements 0.80282
published_at 2026-04-12T12:55:00Z
9
value 0.01381
scoring_system epss
scoring_elements 0.80275
published_at 2026-04-13T12:55:00Z
10
value 0.01381
scoring_system epss
scoring_elements 0.80306
published_at 2026-04-16T12:55:00Z
11
value 0.01381
scoring_system epss
scoring_elements 0.80307
published_at 2026-04-18T12:55:00Z
12
value 0.01381
scoring_system epss
scoring_elements 0.80311
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2715
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220606
reference_id 1220606
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220606
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715
reference_id CVE-2015-2715
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715
4
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-53
reference_id mfsa2015-53
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-53
6
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2715
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nav6-hsaf-2fbj
34
url VCID-qdev-8m9n-8bbr
vulnerability_id VCID-qdev-8m9n-8bbr
summary security update
references
0
reference_url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html
1
reference_url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html
2
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
3
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1307.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1307.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1354.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1354.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1371.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1371.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1568
reference_id
reference_type
scores
0
value 0.30935
scoring_system epss
scoring_elements 0.96749
published_at 2026-04-24T12:55:00Z
1
value 0.30935
scoring_system epss
scoring_elements 0.96737
published_at 2026-04-13T12:55:00Z
2
value 0.30935
scoring_system epss
scoring_elements 0.96743
published_at 2026-04-16T12:55:00Z
3
value 0.30935
scoring_system epss
scoring_elements 0.96747
published_at 2026-04-18T12:55:00Z
4
value 0.30935
scoring_system epss
scoring_elements 0.9675
published_at 2026-04-21T12:55:00Z
5
value 0.30935
scoring_system epss
scoring_elements 0.96718
published_at 2026-04-04T12:55:00Z
6
value 0.30935
scoring_system epss
scoring_elements 0.96722
published_at 2026-04-07T12:55:00Z
7
value 0.30935
scoring_system epss
scoring_elements 0.9673
published_at 2026-04-08T12:55:00Z
8
value 0.30935
scoring_system epss
scoring_elements 0.96731
published_at 2026-04-09T12:55:00Z
9
value 0.30935
scoring_system epss
scoring_elements 0.96734
published_at 2026-04-12T12:55:00Z
10
value 0.34437
scoring_system epss
scoring_elements 0.96962
published_at 2026-04-01T12:55:00Z
11
value 0.34437
scoring_system epss
scoring_elements 0.9697
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1568
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1064636
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1064636
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1069405
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1069405
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
15
reference_url http://secunia.com/advisories/61540
reference_id
reference_type
scores
url http://secunia.com/advisories/61540
16
reference_url http://secunia.com/advisories/61574
reference_id
reference_type
scores
url http://secunia.com/advisories/61574
17
reference_url http://secunia.com/advisories/61575
reference_id
reference_type
scores
url http://secunia.com/advisories/61575
18
reference_url http://secunia.com/advisories/61576
reference_id
reference_type
scores
url http://secunia.com/advisories/61576
19
reference_url http://secunia.com/advisories/61583
reference_id
reference_type
scores
url http://secunia.com/advisories/61583
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/96194
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/96194
21
reference_url http://www.debian.org/security/2014/dsa-3033
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3033
22
reference_url http://www.debian.org/security/2014/dsa-3034
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3034
23
reference_url http://www.debian.org/security/2014/dsa-3037
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3037
24
reference_url http://www.kb.cert.org/vuls/id/772676
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/772676
25
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-73.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-73.html
26
reference_url http://www.novell.com/support/kb/doc.php?id=7015701
reference_id
reference_type
scores
url http://www.novell.com/support/kb/doc.php?id=7015701
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
29
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
31
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
32
reference_url http://www.securityfocus.com/bid/70116
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70116
33
reference_url http://www.ubuntu.com/usn/USN-2360-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2360-1
34
reference_url http://www.ubuntu.com/usn/USN-2360-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2360-2
35
reference_url http://www.ubuntu.com/usn/USN-2361-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2361-1
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1145429
reference_id 1145429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1145429
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
242
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
243
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
244
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*
245
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*
246
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*
247
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*
248
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*
249
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*
250
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*
251
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*
252
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*
253
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*
254
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*
255
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*
256
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*
257
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*
258
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*
259
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*
260
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*
261
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*
262
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
263
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
264
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
265
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*
266
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
267
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
268
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
269
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1568
reference_id CVE-2014-1568
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1568
270
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
271
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-73
reference_id mfsa2014-73
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-73
272
reference_url https://access.redhat.com/errata/RHSA-2014:1307
reference_id RHSA-2014:1307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1307
273
reference_url https://access.redhat.com/errata/RHSA-2014:1354
reference_id RHSA-2014:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1354
274
reference_url https://access.redhat.com/errata/RHSA-2014:1371
reference_id RHSA-2014:1371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1371
275
reference_url https://usn.ubuntu.com/2360-1/
reference_id USN-2360-1
reference_type
scores
url https://usn.ubuntu.com/2360-1/
276
reference_url https://usn.ubuntu.com/2360-2/
reference_id USN-2360-2
reference_type
scores
url https://usn.ubuntu.com/2360-2/
277
reference_url https://usn.ubuntu.com/2361-1/
reference_id USN-2361-1
reference_type
scores
url https://usn.ubuntu.com/2361-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-1568
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdev-8m9n-8bbr
35
url VCID-qj59-9xmk-7yg9
vulnerability_id VCID-qj59-9xmk-7yg9
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2722
reference_id
reference_type
scores
0
value 0.02313
scoring_system epss
scoring_elements 0.84822
published_at 2026-04-24T12:55:00Z
1
value 0.02313
scoring_system epss
scoring_elements 0.84701
published_at 2026-04-01T12:55:00Z
2
value 0.02313
scoring_system epss
scoring_elements 0.84716
published_at 2026-04-02T12:55:00Z
3
value 0.02313
scoring_system epss
scoring_elements 0.84736
published_at 2026-04-04T12:55:00Z
4
value 0.02313
scoring_system epss
scoring_elements 0.84738
published_at 2026-04-07T12:55:00Z
5
value 0.02313
scoring_system epss
scoring_elements 0.8476
published_at 2026-04-08T12:55:00Z
6
value 0.02313
scoring_system epss
scoring_elements 0.84767
published_at 2026-04-09T12:55:00Z
7
value 0.02313
scoring_system epss
scoring_elements 0.84785
published_at 2026-04-11T12:55:00Z
8
value 0.02313
scoring_system epss
scoring_elements 0.8478
published_at 2026-04-12T12:55:00Z
9
value 0.02313
scoring_system epss
scoring_elements 0.84774
published_at 2026-04-13T12:55:00Z
10
value 0.02313
scoring_system epss
scoring_elements 0.84796
published_at 2026-04-16T12:55:00Z
11
value 0.02313
scoring_system epss
scoring_elements 0.84797
published_at 2026-04-18T12:55:00Z
12
value 0.02313
scoring_system epss
scoring_elements 0.84795
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2722
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236955
reference_id 1236955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236955
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722
reference_id CVE-2015-2722
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-65
reference_id mfsa2015-65
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-65
6
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
7
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
8
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2722
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qj59-9xmk-7yg9
36
url VCID-qpzb-b3nx-m3cv
vulnerability_id VCID-qpzb-b3nx-m3cv
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1591.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1591.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1591
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50634
published_at 2026-04-24T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.5057
published_at 2026-04-01T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50707
published_at 2026-04-18T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50686
published_at 2026-04-21T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50622
published_at 2026-04-02T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50649
published_at 2026-04-04T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50604
published_at 2026-04-07T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50659
published_at 2026-04-08T12:55:00Z
8
value 0.00272
scoring_system epss
scoring_elements 0.50655
published_at 2026-04-09T12:55:00Z
9
value 0.00272
scoring_system epss
scoring_elements 0.50698
published_at 2026-04-11T12:55:00Z
10
value 0.00272
scoring_system epss
scoring_elements 0.50675
published_at 2026-04-12T12:55:00Z
11
value 0.00272
scoring_system epss
scoring_elements 0.5066
published_at 2026-04-13T12:55:00Z
12
value 0.00272
scoring_system epss
scoring_elements 0.50701
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1591
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1069762
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1069762
3
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-86.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-86.html
4
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169207
reference_id 1169207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169207
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591
reference_id CVE-2014-1591
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1591
reference_id CVE-2014-1591
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1591
10
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-86
reference_id mfsa2014-86
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-86
12
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-1591
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpzb-b3nx-m3cv
37
url VCID-r56k-pzrk-kfbb
vulnerability_id VCID-r56k-pzrk-kfbb
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1635.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1635.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1647.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1647.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1577.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1577.json
11
reference_url https://advisories.mageia.org/MGASA-2014-0421.html
reference_id
reference_type
scores
url https://advisories.mageia.org/MGASA-2014-0421.html
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1577
reference_id
reference_type
scores
0
value 0.01287
scoring_system epss
scoring_elements 0.79696
published_at 2026-04-24T12:55:00Z
1
value 0.01287
scoring_system epss
scoring_elements 0.79581
published_at 2026-04-01T12:55:00Z
2
value 0.01287
scoring_system epss
scoring_elements 0.79662
published_at 2026-04-18T12:55:00Z
3
value 0.01287
scoring_system epss
scoring_elements 0.79666
published_at 2026-04-21T12:55:00Z
4
value 0.01287
scoring_system epss
scoring_elements 0.79588
published_at 2026-04-02T12:55:00Z
5
value 0.01287
scoring_system epss
scoring_elements 0.79611
published_at 2026-04-04T12:55:00Z
6
value 0.01287
scoring_system epss
scoring_elements 0.79598
published_at 2026-04-07T12:55:00Z
7
value 0.01287
scoring_system epss
scoring_elements 0.79626
published_at 2026-04-08T12:55:00Z
8
value 0.01287
scoring_system epss
scoring_elements 0.79634
published_at 2026-04-09T12:55:00Z
9
value 0.01287
scoring_system epss
scoring_elements 0.79655
published_at 2026-04-11T12:55:00Z
10
value 0.01287
scoring_system epss
scoring_elements 0.79639
published_at 2026-04-12T12:55:00Z
11
value 0.01287
scoring_system epss
scoring_elements 0.79632
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1577
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1012609
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1012609
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
22
reference_url http://secunia.com/advisories/61387
reference_id
reference_type
scores
url http://secunia.com/advisories/61387
23
reference_url http://secunia.com/advisories/61854
reference_id
reference_type
scores
url http://secunia.com/advisories/61854
24
reference_url http://secunia.com/advisories/62021
reference_id
reference_type
scores
url http://secunia.com/advisories/62021
25
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
26
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
27
reference_url http://www.debian.org/security/2014/dsa-3050
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3050
28
reference_url http://www.debian.org/security/2014/dsa-3061
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3061
29
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-76.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-76.html
30
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
31
reference_url http://www.securityfocus.com/bid/70440
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70440
32
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
33
reference_url http://www.securitytracker.com/id/1031030
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031030
34
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
35
reference_url http://www.ubuntu.com/usn/USN-2373-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2373-1
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152359
reference_id 1152359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152359
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1577
reference_id CVE-2014-1577
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1577
44
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
45
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-76
reference_id mfsa2014-76
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-76
46
reference_url https://access.redhat.com/errata/RHSA-2014:1635
reference_id RHSA-2014:1635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1635
47
reference_url https://access.redhat.com/errata/RHSA-2014:1647
reference_id RHSA-2014:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1647
48
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
49
reference_url https://usn.ubuntu.com/2373-1/
reference_id USN-2373-1
reference_type
scores
url https://usn.ubuntu.com/2373-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-1577
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r56k-pzrk-kfbb
38
url VCID-r7v8-qp3e-cua2
vulnerability_id VCID-r7v8-qp3e-cua2
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2717
reference_id
reference_type
scores
0
value 0.02421
scoring_system epss
scoring_elements 0.85175
published_at 2026-04-24T12:55:00Z
1
value 0.02421
scoring_system epss
scoring_elements 0.85058
published_at 2026-04-01T12:55:00Z
2
value 0.02421
scoring_system epss
scoring_elements 0.85071
published_at 2026-04-02T12:55:00Z
3
value 0.02421
scoring_system epss
scoring_elements 0.85088
published_at 2026-04-04T12:55:00Z
4
value 0.02421
scoring_system epss
scoring_elements 0.85093
published_at 2026-04-07T12:55:00Z
5
value 0.02421
scoring_system epss
scoring_elements 0.85114
published_at 2026-04-08T12:55:00Z
6
value 0.02421
scoring_system epss
scoring_elements 0.85121
published_at 2026-04-09T12:55:00Z
7
value 0.02421
scoring_system epss
scoring_elements 0.85136
published_at 2026-04-11T12:55:00Z
8
value 0.02421
scoring_system epss
scoring_elements 0.85133
published_at 2026-04-12T12:55:00Z
9
value 0.02421
scoring_system epss
scoring_elements 0.8513
published_at 2026-04-13T12:55:00Z
10
value 0.02421
scoring_system epss
scoring_elements 0.85151
published_at 2026-04-16T12:55:00Z
11
value 0.02421
scoring_system epss
scoring_elements 0.85154
published_at 2026-04-18T12:55:00Z
12
value 0.02421
scoring_system epss
scoring_elements 0.85152
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2717
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220608
reference_id 1220608
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220608
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717
reference_id CVE-2015-2717
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717
4
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-55
reference_id mfsa2015-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-55
6
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2717
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r7v8-qp3e-cua2
39
url VCID-r8f9-h598-7bg5
vulnerability_id VCID-r8f9-h598-7bg5
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8641.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8641
reference_id
reference_type
scores
0
value 0.01522
scoring_system epss
scoring_elements 0.8132
published_at 2026-04-24T12:55:00Z
1
value 0.01522
scoring_system epss
scoring_elements 0.81197
published_at 2026-04-01T12:55:00Z
2
value 0.01522
scoring_system epss
scoring_elements 0.81205
published_at 2026-04-02T12:55:00Z
3
value 0.01522
scoring_system epss
scoring_elements 0.81228
published_at 2026-04-07T12:55:00Z
4
value 0.01522
scoring_system epss
scoring_elements 0.81256
published_at 2026-04-08T12:55:00Z
5
value 0.01522
scoring_system epss
scoring_elements 0.81261
published_at 2026-04-09T12:55:00Z
6
value 0.01522
scoring_system epss
scoring_elements 0.81282
published_at 2026-04-11T12:55:00Z
7
value 0.01522
scoring_system epss
scoring_elements 0.81268
published_at 2026-04-12T12:55:00Z
8
value 0.01522
scoring_system epss
scoring_elements 0.8126
published_at 2026-04-13T12:55:00Z
9
value 0.01522
scoring_system epss
scoring_elements 0.81297
published_at 2026-04-21T12:55:00Z
10
value 0.01522
scoring_system epss
scoring_elements 0.81298
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8641
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180973
reference_id 1180973
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180973
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-06
reference_id mfsa2015-06
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-06
9
reference_url https://access.redhat.com/errata/RHSA-2015:0046
reference_id RHSA-2015:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0046
10
reference_url https://usn.ubuntu.com/2458-1/
reference_id USN-2458-1
reference_type
scores
url https://usn.ubuntu.com/2458-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-8641
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r8f9-h598-7bg5
40
url VCID-rzqy-gheq-cqgg
vulnerability_id VCID-rzqy-gheq-cqgg
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4000
reference_id
reference_type
scores
0
value 0.93743
scoring_system epss
scoring_elements 0.99851
published_at 2026-04-07T12:55:00Z
1
value 0.93743
scoring_system epss
scoring_elements 0.99853
published_at 2026-04-24T12:55:00Z
2
value 0.93743
scoring_system epss
scoring_elements 0.99852
published_at 2026-04-21T12:55:00Z
3
value 0.93894
scoring_system epss
scoring_elements 0.99875
published_at 2026-04-08T12:55:00Z
4
value 0.93894
scoring_system epss
scoring_elements 0.99876
published_at 2026-04-09T12:55:00Z
5
value 0.939
scoring_system epss
scoring_elements 0.99876
published_at 2026-04-13T12:55:00Z
6
value 0.939
scoring_system epss
scoring_elements 0.99873
published_at 2026-04-01T12:55:00Z
7
value 0.939
scoring_system epss
scoring_elements 0.99875
published_at 2026-04-12T12:55:00Z
8
value 0.939
scoring_system epss
scoring_elements 0.99877
published_at 2026-04-18T12:55:00Z
9
value 0.939
scoring_system epss
scoring_elements 0.99874
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
47
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1223211
reference_id 1223211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1223211
49
reference_url https://security.gentoo.org/glsa/201506-02
reference_id GLSA-201506-02
reference_type
scores
url https://security.gentoo.org/glsa/201506-02
50
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
51
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
52
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
53
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-70
reference_id mfsa2015-70
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-70
55
reference_url https://access.redhat.com/errata/RHSA-2015:1072
reference_id RHSA-2015:1072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1072
56
reference_url https://access.redhat.com/errata/RHSA-2015:1185
reference_id RHSA-2015:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1185
57
reference_url https://access.redhat.com/errata/RHSA-2015:1197
reference_id RHSA-2015:1197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1197
58
reference_url https://access.redhat.com/errata/RHSA-2015:1228
reference_id RHSA-2015:1228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1228
59
reference_url https://access.redhat.com/errata/RHSA-2015:1229
reference_id RHSA-2015:1229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1229
60
reference_url https://access.redhat.com/errata/RHSA-2015:1230
reference_id RHSA-2015:1230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1230
61
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
62
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
63
reference_url https://access.redhat.com/errata/RHSA-2015:1243
reference_id RHSA-2015:1243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1243
64
reference_url https://access.redhat.com/errata/RHSA-2015:1485
reference_id RHSA-2015:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1485
65
reference_url https://access.redhat.com/errata/RHSA-2015:1486
reference_id RHSA-2015:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1486
66
reference_url https://access.redhat.com/errata/RHSA-2015:1488
reference_id RHSA-2015:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1488
67
reference_url https://access.redhat.com/errata/RHSA-2015:1526
reference_id RHSA-2015:1526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1526
68
reference_url https://access.redhat.com/errata/RHSA-2015:1544
reference_id RHSA-2015:1544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1544
69
reference_url https://access.redhat.com/errata/RHSA-2015:1604
reference_id RHSA-2015:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1604
70
reference_url https://access.redhat.com/errata/RHSA-2016:2056
reference_id RHSA-2016:2056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2056
71
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
72
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
73
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
74
reference_url https://usn.ubuntu.com/2696-1/
reference_id USN-2696-1
reference_type
scores
url https://usn.ubuntu.com/2696-1/
75
reference_url https://usn.ubuntu.com/2706-1/
reference_id USN-2706-1
reference_type
scores
url https://usn.ubuntu.com/2706-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-4000
risk_score 7.2
exploitability 2.0
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqy-gheq-cqgg
41
url VCID-tsmv-w2tb-hyht
vulnerability_id VCID-tsmv-w2tb-hyht
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4487
reference_id
reference_type
scores
0
value 0.02676
scoring_system epss
scoring_elements 0.85868
published_at 2026-04-24T12:55:00Z
1
value 0.02676
scoring_system epss
scoring_elements 0.85754
published_at 2026-04-01T12:55:00Z
2
value 0.02676
scoring_system epss
scoring_elements 0.85767
published_at 2026-04-02T12:55:00Z
3
value 0.02676
scoring_system epss
scoring_elements 0.85785
published_at 2026-04-04T12:55:00Z
4
value 0.02676
scoring_system epss
scoring_elements 0.85791
published_at 2026-04-07T12:55:00Z
5
value 0.02676
scoring_system epss
scoring_elements 0.8581
published_at 2026-04-08T12:55:00Z
6
value 0.02676
scoring_system epss
scoring_elements 0.8582
published_at 2026-04-09T12:55:00Z
7
value 0.02676
scoring_system epss
scoring_elements 0.85835
published_at 2026-04-11T12:55:00Z
8
value 0.02676
scoring_system epss
scoring_elements 0.85832
published_at 2026-04-12T12:55:00Z
9
value 0.02676
scoring_system epss
scoring_elements 0.85828
published_at 2026-04-13T12:55:00Z
10
value 0.02676
scoring_system epss
scoring_elements 0.85847
published_at 2026-04-16T12:55:00Z
11
value 0.02676
scoring_system epss
scoring_elements 0.85851
published_at 2026-04-18T12:55:00Z
12
value 0.02676
scoring_system epss
scoring_elements 0.85846
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4487
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252293
reference_id 1252293
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252293
25
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-90
reference_id mfsa2015-90
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-90
27
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
28
reference_url https://access.redhat.com/errata/RHSA-2015:1682
reference_id RHSA-2015:1682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1682
29
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
30
reference_url https://usn.ubuntu.com/2712-1/
reference_id USN-2712-1
reference_type
scores
url https://usn.ubuntu.com/2712-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
1
url pkg:mozilla/Firefox%20OS@2.5.0
purl pkg:mozilla/Firefox%20OS@2.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0
aliases CVE-2015-4487
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsmv-w2tb-hyht
42
url VCID-vhpz-366r-hbg1
vulnerability_id VCID-vhpz-366r-hbg1
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1590.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1590.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1590
reference_id
reference_type
scores
0
value 0.01019
scoring_system epss
scoring_elements 0.77276
published_at 2026-04-24T12:55:00Z
1
value 0.01019
scoring_system epss
scoring_elements 0.77147
published_at 2026-04-01T12:55:00Z
2
value 0.01019
scoring_system epss
scoring_elements 0.77251
published_at 2026-04-18T12:55:00Z
3
value 0.01019
scoring_system epss
scoring_elements 0.77242
published_at 2026-04-21T12:55:00Z
4
value 0.01019
scoring_system epss
scoring_elements 0.77154
published_at 2026-04-02T12:55:00Z
5
value 0.01019
scoring_system epss
scoring_elements 0.77183
published_at 2026-04-04T12:55:00Z
6
value 0.01019
scoring_system epss
scoring_elements 0.77165
published_at 2026-04-07T12:55:00Z
7
value 0.01019
scoring_system epss
scoring_elements 0.77198
published_at 2026-04-08T12:55:00Z
8
value 0.01019
scoring_system epss
scoring_elements 0.77206
published_at 2026-04-09T12:55:00Z
9
value 0.01019
scoring_system epss
scoring_elements 0.77234
published_at 2026-04-11T12:55:00Z
10
value 0.01019
scoring_system epss
scoring_elements 0.77213
published_at 2026-04-12T12:55:00Z
11
value 0.01019
scoring_system epss
scoring_elements 0.77209
published_at 2026-04-13T12:55:00Z
12
value 0.01019
scoring_system epss
scoring_elements 0.77249
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1590
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1087633
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1087633
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
11
reference_url http://www.debian.org/security/2014/dsa-3090
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3090
12
reference_url http://www.debian.org/security/2014/dsa-3092
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3092
13
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-85.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-85.html
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
15
reference_url http://www.securityfocus.com/bid/71397
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71397
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169206
reference_id 1169206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169206
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1590
reference_id CVE-2014-1590
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1590
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-85
reference_id mfsa2014-85
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-85
23
reference_url https://access.redhat.com/errata/RHSA-2014:1919
reference_id RHSA-2014:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1919
24
reference_url https://access.redhat.com/errata/RHSA-2014:1924
reference_id RHSA-2014:1924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1924
25
reference_url https://usn.ubuntu.com/2424-1/
reference_id USN-2424-1
reference_type
scores
url https://usn.ubuntu.com/2424-1/
26
reference_url https://usn.ubuntu.com/2428-1/
reference_id USN-2428-1
reference_type
scores
url https://usn.ubuntu.com/2428-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-1590
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vhpz-366r-hbg1
43
url VCID-w63q-84j6-h7dk
vulnerability_id VCID-w63q-84j6-h7dk
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0830
reference_id
reference_type
scores
0
value 0.00942
scoring_system epss
scoring_elements 0.76321
published_at 2026-04-24T12:55:00Z
1
value 0.00942
scoring_system epss
scoring_elements 0.76192
published_at 2026-04-01T12:55:00Z
2
value 0.00942
scoring_system epss
scoring_elements 0.76198
published_at 2026-04-02T12:55:00Z
3
value 0.00942
scoring_system epss
scoring_elements 0.7623
published_at 2026-04-04T12:55:00Z
4
value 0.00942
scoring_system epss
scoring_elements 0.7621
published_at 2026-04-07T12:55:00Z
5
value 0.00942
scoring_system epss
scoring_elements 0.76242
published_at 2026-04-08T12:55:00Z
6
value 0.00942
scoring_system epss
scoring_elements 0.76256
published_at 2026-04-09T12:55:00Z
7
value 0.00942
scoring_system epss
scoring_elements 0.76282
published_at 2026-04-11T12:55:00Z
8
value 0.00942
scoring_system epss
scoring_elements 0.76259
published_at 2026-04-12T12:55:00Z
9
value 0.00942
scoring_system epss
scoring_elements 0.76255
published_at 2026-04-13T12:55:00Z
10
value 0.00942
scoring_system epss
scoring_elements 0.76296
published_at 2026-04-16T12:55:00Z
11
value 0.00942
scoring_system epss
scoring_elements 0.763
published_at 2026-04-18T12:55:00Z
12
value 0.00942
scoring_system epss
scoring_elements 0.76285
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0830
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195613
reference_id 1195613
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195613
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830
reference_id CVE-2015-0830
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-14
reference_id mfsa2015-14
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-14
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0830
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w63q-84j6-h7dk
44
url VCID-xjf8-mc7t-hfah
vulnerability_id VCID-xjf8-mc7t-hfah
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2724
reference_id
reference_type
scores
0
value 0.00912
scoring_system epss
scoring_elements 0.75919
published_at 2026-04-24T12:55:00Z
1
value 0.00912
scoring_system epss
scoring_elements 0.75798
published_at 2026-04-01T12:55:00Z
2
value 0.00912
scoring_system epss
scoring_elements 0.75802
published_at 2026-04-02T12:55:00Z
3
value 0.00912
scoring_system epss
scoring_elements 0.75835
published_at 2026-04-04T12:55:00Z
4
value 0.00912
scoring_system epss
scoring_elements 0.75813
published_at 2026-04-07T12:55:00Z
5
value 0.00912
scoring_system epss
scoring_elements 0.75845
published_at 2026-04-08T12:55:00Z
6
value 0.00912
scoring_system epss
scoring_elements 0.75857
published_at 2026-04-09T12:55:00Z
7
value 0.00912
scoring_system epss
scoring_elements 0.75881
published_at 2026-04-11T12:55:00Z
8
value 0.00912
scoring_system epss
scoring_elements 0.75862
published_at 2026-04-12T12:55:00Z
9
value 0.00912
scoring_system epss
scoring_elements 0.75855
published_at 2026-04-13T12:55:00Z
10
value 0.00912
scoring_system epss
scoring_elements 0.75893
published_at 2026-04-16T12:55:00Z
11
value 0.00912
scoring_system epss
scoring_elements 0.75896
published_at 2026-04-18T12:55:00Z
12
value 0.00912
scoring_system epss
scoring_elements 0.75882
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2724
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236947
reference_id 1236947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236947
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-59
reference_id mfsa2015-59
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-59
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
22
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2724
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xjf8-mc7t-hfah
45
url VCID-xqxf-cnpj-3qas
vulnerability_id VCID-xqxf-cnpj-3qas
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2728
reference_id
reference_type
scores
0
value 0.01072
scoring_system epss
scoring_elements 0.77811
published_at 2026-04-24T12:55:00Z
1
value 0.01072
scoring_system epss
scoring_elements 0.7769
published_at 2026-04-01T12:55:00Z
2
value 0.01072
scoring_system epss
scoring_elements 0.77697
published_at 2026-04-02T12:55:00Z
3
value 0.01072
scoring_system epss
scoring_elements 0.77724
published_at 2026-04-04T12:55:00Z
4
value 0.01072
scoring_system epss
scoring_elements 0.77707
published_at 2026-04-07T12:55:00Z
5
value 0.01072
scoring_system epss
scoring_elements 0.77735
published_at 2026-04-08T12:55:00Z
6
value 0.01072
scoring_system epss
scoring_elements 0.7774
published_at 2026-04-09T12:55:00Z
7
value 0.01072
scoring_system epss
scoring_elements 0.77766
published_at 2026-04-11T12:55:00Z
8
value 0.01072
scoring_system epss
scoring_elements 0.77751
published_at 2026-04-12T12:55:00Z
9
value 0.01072
scoring_system epss
scoring_elements 0.7775
published_at 2026-04-13T12:55:00Z
10
value 0.01072
scoring_system epss
scoring_elements 0.77786
published_at 2026-04-16T12:55:00Z
11
value 0.01072
scoring_system epss
scoring_elements 0.77785
published_at 2026-04-18T12:55:00Z
12
value 0.01072
scoring_system epss
scoring_elements 0.77778
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2728
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236951
reference_id 1236951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236951
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-61
reference_id mfsa2015-61
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-61
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
20
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2728
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqxf-cnpj-3qas
46
url VCID-xs3q-48t9-1qgn
vulnerability_id VCID-xs3q-48t9-1qgn
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1580.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1580.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1580
reference_id
reference_type
scores
0
value 0.00456
scoring_system epss
scoring_elements 0.63948
published_at 2026-04-24T12:55:00Z
1
value 0.00456
scoring_system epss
scoring_elements 0.63818
published_at 2026-04-01T12:55:00Z
2
value 0.00456
scoring_system epss
scoring_elements 0.63932
published_at 2026-04-21T12:55:00Z
3
value 0.00456
scoring_system epss
scoring_elements 0.63942
published_at 2026-04-18T12:55:00Z
4
value 0.00456
scoring_system epss
scoring_elements 0.63879
published_at 2026-04-02T12:55:00Z
5
value 0.00456
scoring_system epss
scoring_elements 0.63906
published_at 2026-04-04T12:55:00Z
6
value 0.00456
scoring_system epss
scoring_elements 0.63863
published_at 2026-04-07T12:55:00Z
7
value 0.00456
scoring_system epss
scoring_elements 0.63914
published_at 2026-04-08T12:55:00Z
8
value 0.00456
scoring_system epss
scoring_elements 0.63931
published_at 2026-04-09T12:55:00Z
9
value 0.00456
scoring_system epss
scoring_elements 0.63944
published_at 2026-04-11T12:55:00Z
10
value 0.00456
scoring_system epss
scoring_elements 0.6393
published_at 2026-04-12T12:55:00Z
11
value 0.00456
scoring_system epss
scoring_elements 0.63897
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1580
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1063733
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1063733
7
reference_url http://secunia.com/advisories/62022
reference_id
reference_type
scores
url http://secunia.com/advisories/62022
8
reference_url http://secunia.com/advisories/62023
reference_id
reference_type
scores
url http://secunia.com/advisories/62023
9
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-78.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-78.html
10
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
11
reference_url http://www.securityfocus.com/bid/70431
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70431
12
reference_url http://www.securitytracker.com/id/1031028
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031028
13
reference_url http://www.ubuntu.com/usn/USN-2372-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2372-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152362
reference_id 1152362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152362
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580
reference_id CVE-2014-1580
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1580
reference_id CVE-2014-1580
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-1580
21
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-78
reference_id mfsa2014-78
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-78
23
reference_url https://usn.ubuntu.com/2372-1/
reference_id USN-2372-1
reference_type
scores
url https://usn.ubuntu.com/2372-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2014-1580
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xs3q-48t9-1qgn
47
url VCID-xx39-5rg1-b3am
vulnerability_id VCID-xx39-5rg1-b3am
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2710
reference_id
reference_type
scores
0
value 0.02421
scoring_system epss
scoring_elements 0.85175
published_at 2026-04-24T12:55:00Z
1
value 0.02421
scoring_system epss
scoring_elements 0.85058
published_at 2026-04-01T12:55:00Z
2
value 0.02421
scoring_system epss
scoring_elements 0.85071
published_at 2026-04-02T12:55:00Z
3
value 0.02421
scoring_system epss
scoring_elements 0.85088
published_at 2026-04-04T12:55:00Z
4
value 0.02421
scoring_system epss
scoring_elements 0.85092
published_at 2026-04-07T12:55:00Z
5
value 0.02421
scoring_system epss
scoring_elements 0.85114
published_at 2026-04-08T12:55:00Z
6
value 0.02421
scoring_system epss
scoring_elements 0.85121
published_at 2026-04-09T12:55:00Z
7
value 0.02421
scoring_system epss
scoring_elements 0.85135
published_at 2026-04-11T12:55:00Z
8
value 0.02421
scoring_system epss
scoring_elements 0.85133
published_at 2026-04-12T12:55:00Z
9
value 0.02421
scoring_system epss
scoring_elements 0.8513
published_at 2026-04-13T12:55:00Z
10
value 0.02421
scoring_system epss
scoring_elements 0.85151
published_at 2026-04-21T12:55:00Z
11
value 0.02421
scoring_system epss
scoring_elements 0.85154
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220601
reference_id 1220601
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220601
9
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-48
reference_id mfsa2015-48
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-48
11
reference_url https://access.redhat.com/errata/RHSA-2015:0988
reference_id RHSA-2015:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0988
12
reference_url https://access.redhat.com/errata/RHSA-2015:1012
reference_id RHSA-2015:1012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1012
13
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
14
reference_url https://usn.ubuntu.com/2603-1/
reference_id USN-2603-1
reference_type
scores
url https://usn.ubuntu.com/2603-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2710
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xx39-5rg1-b3am
48
url VCID-ys1x-t7un-ayhr
vulnerability_id VCID-ys1x-t7un-ayhr
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0807
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33338
published_at 2026-04-24T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33485
published_at 2026-04-01T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33639
published_at 2026-04-02T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33673
published_at 2026-04-04T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33512
published_at 2026-04-07T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33556
published_at 2026-04-08T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.3359
published_at 2026-04-09T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33584
published_at 2026-04-11T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33543
published_at 2026-04-12T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33519
published_at 2026-04-13T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33554
published_at 2026-04-16T12:55:00Z
11
value 0.00137
scoring_system epss
scoring_elements 0.33531
published_at 2026-04-18T12:55:00Z
12
value 0.00137
scoring_system epss
scoring_elements 0.33497
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0807
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207076
reference_id 1207076
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207076
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-37
reference_id mfsa2015-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-37
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0807
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ys1x-t7un-ayhr
49
url VCID-zca5-m2yy-zybb
vulnerability_id VCID-zca5-m2yy-zybb
summary
Security researcher Muneaki Nishimura reported an issue with Gaia's Search app
which allows an attacker to inject HTML code into the System app's context via specially-crafted
search links. The injection occurs when the user opens such malicious link in the browser and then
re-opens the browser or opens the tab view.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2744
reference_id
reference_type
scores
0
value 0.00263
scoring_system epss
scoring_elements 0.49661
published_at 2026-04-24T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49607
published_at 2026-04-01T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49637
published_at 2026-04-02T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49664
published_at 2026-04-04T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49616
published_at 2026-04-07T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49671
published_at 2026-04-21T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49665
published_at 2026-04-09T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49682
published_at 2026-04-11T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49653
published_at 2026-04-12T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49655
published_at 2026-04-13T12:55:00Z
10
value 0.00263
scoring_system epss
scoring_elements 0.49702
published_at 2026-04-16T12:55:00Z
11
value 0.00263
scoring_system epss
scoring_elements 0.497
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2744
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2744
reference_id CVE-2015-2744
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2744
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-72
reference_id mfsa2015-72
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-72
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-2744
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zca5-m2yy-zybb
50
url VCID-zeyg-dbfj-93eg
vulnerability_id VCID-zeyg-dbfj-93eg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0829
reference_id
reference_type
scores
0
value 0.02182
scoring_system epss
scoring_elements 0.84411
published_at 2026-04-24T12:55:00Z
1
value 0.02182
scoring_system epss
scoring_elements 0.84291
published_at 2026-04-01T12:55:00Z
2
value 0.02182
scoring_system epss
scoring_elements 0.84304
published_at 2026-04-02T12:55:00Z
3
value 0.02182
scoring_system epss
scoring_elements 0.84324
published_at 2026-04-04T12:55:00Z
4
value 0.02182
scoring_system epss
scoring_elements 0.84326
published_at 2026-04-07T12:55:00Z
5
value 0.02182
scoring_system epss
scoring_elements 0.84347
published_at 2026-04-08T12:55:00Z
6
value 0.02182
scoring_system epss
scoring_elements 0.84352
published_at 2026-04-09T12:55:00Z
7
value 0.02182
scoring_system epss
scoring_elements 0.84371
published_at 2026-04-11T12:55:00Z
8
value 0.02182
scoring_system epss
scoring_elements 0.84363
published_at 2026-04-12T12:55:00Z
9
value 0.02182
scoring_system epss
scoring_elements 0.84359
published_at 2026-04-13T12:55:00Z
10
value 0.02182
scoring_system epss
scoring_elements 0.84381
published_at 2026-04-16T12:55:00Z
11
value 0.02182
scoring_system epss
scoring_elements 0.84382
published_at 2026-04-18T12:55:00Z
12
value 0.02182
scoring_system epss
scoring_elements 0.84385
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0829
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195620
reference_id 1195620
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195620
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829
reference_id CVE-2015-0829
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-17
reference_id mfsa2015-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-17
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0829
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zeyg-dbfj-93eg
51
url VCID-zxvq-vk4c-ebd9
vulnerability_id VCID-zxvq-vk4c-ebd9
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0832
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.3046
published_at 2026-04-24T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30663
published_at 2026-04-01T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30796
published_at 2026-04-02T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30843
published_at 2026-04-04T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30662
published_at 2026-04-07T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.3072
published_at 2026-04-08T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30752
published_at 2026-04-09T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30756
published_at 2026-04-11T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30711
published_at 2026-04-12T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30665
published_at 2026-04-13T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30689
published_at 2026-04-16T12:55:00Z
11
value 0.00118
scoring_system epss
scoring_elements 0.30672
published_at 2026-04-18T12:55:00Z
12
value 0.00118
scoring_system epss
scoring_elements 0.30639
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0832
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195610
reference_id 1195610
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195610
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832
reference_id CVE-2015-0832
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832
4
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-13
reference_id mfsa2015-13
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-13
6
reference_url https://usn.ubuntu.com/2505-1/
reference_id USN-2505-1
reference_type
scores
url https://usn.ubuntu.com/2505-1/
fixed_packages
0
url pkg:mozilla/Firefox%20OS@2.2.0
purl pkg:mozilla/Firefox%20OS@2.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0
aliases CVE-2015-0832
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxvq-vk4c-ebd9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0