Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/86743?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "type": "mozilla", "namespace": "", "name": "Firefox OS", "version": "2.2.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.5.0", "latest_non_vulnerable_version": "2.5.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59586?format=api", "vulnerability_id": "VCID-45ek-y9nx-j3cd", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.8379", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83688", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83701", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83715", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83718", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83742", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83749", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83765", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83759", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83788", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83789", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195619", "reference_id": "1195619", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195619" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-16", "reference_id": "mfsa2015-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0831" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45ek-y9nx-j3cd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57039?format=api", "vulnerability_id": "VCID-4vhr-24e3-d3d2", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1593.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1593.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1593", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84134", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84038", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84128", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.8413", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84051", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84068", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84069", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84093", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84099", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84117", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.8411", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0211", "scoring_system": "epss", "scoring_elements": "0.84106", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1593" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1085175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1085175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3090" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3092", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3092" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-88.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-88.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/71395", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71395" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169209", "reference_id": "1169209", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169209" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1593", "reference_id": "CVE-2014-1593", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1593" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-88", "reference_id": "mfsa2014-88", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-88" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1919", "reference_id": "RHSA-2014:1919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1924", "reference_id": "RHSA-2014:1924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1924" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" }, { "reference_url": "https://usn.ubuntu.com/2428-1/", "reference_id": "USN-2428-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2428-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-1593" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4vhr-24e3-d3d2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51641?format=api", "vulnerability_id": "VCID-51hn-ab8w-c7bn", "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n the worst of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2713", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01751", "scoring_system": "epss", "scoring_elements": "0.82599", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01751", "scoring_system": "epss", "scoring_elements": "0.8249", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01751", "scoring_system": "epss", "scoring_elements": "0.82504", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01751", "scoring_system": "epss", "scoring_elements": "0.82522", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01751", "scoring_system": "epss", "scoring_elements": "0.82519", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01751", "scoring_system": "epss", "scoring_elements": "0.82545", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01751", "scoring_system": "epss", "scoring_elements": "0.82552", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01751", "scoring_system": "epss", "scoring_elements": "0.82571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01751", "scoring_system": "epss", "scoring_elements": "0.82564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01751", "scoring_system": "epss", "scoring_elements": "0.82558", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01751", "scoring_system": "epss", "scoring_elements": "0.82595", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220605", "reference_id": "1220605", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220605" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-51", "reference_id": "mfsa2015-51", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-51" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988", "reference_id": "RHSA-2015:0988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0988" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1012", "reference_id": "RHSA-2015:1012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1012" }, { "reference_url": "https://usn.ubuntu.com/2602-1/", "reference_id": "USN-2602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2602-1/" }, { "reference_url": "https://usn.ubuntu.com/2603-1/", "reference_id": "USN-2603-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2603-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2713" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-51hn-ab8w-c7bn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41000?format=api", "vulnerability_id": "VCID-55jd-xx14-d3h3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0802", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99128", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99115", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99116", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99118", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99122", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99125", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.80386", "scoring_system": "epss", "scoring_elements": "0.99126", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0802" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207086", "reference_id": "1207086", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207086" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802", "reference_id": "CVE-2015-0802", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb", "reference_id": "CVE-2015-0816;CVE-2015-0802;OSVDB-120107;OSVDB-119753", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-42", "reference_id": "mfsa2015-42", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-42" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0802" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55jd-xx14-d3h3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51649?format=api", "vulnerability_id": "VCID-55t4-7jnq-j7fx", "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n the worst of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2716", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05614", "scoring_system": "epss", "scoring_elements": "0.90339", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05614", "scoring_system": "epss", "scoring_elements": "0.90283", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05614", "scoring_system": "epss", "scoring_elements": "0.90286", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05614", "scoring_system": "epss", "scoring_elements": "0.90299", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05614", "scoring_system": "epss", "scoring_elements": "0.90303", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05614", "scoring_system": "epss", "scoring_elements": "0.90318", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05614", "scoring_system": "epss", "scoring_elements": "0.90325", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05614", "scoring_system": "epss", "scoring_elements": "0.90333", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05614", "scoring_system": "epss", "scoring_elements": "0.90332", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05614", "scoring_system": "epss", "scoring_elements": "0.90326", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05614", "scoring_system": "epss", "scoring_elements": "0.90342", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2716" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220607", "reference_id": "1220607", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220607" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-54", "reference_id": "mfsa2015-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-54" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988", "reference_id": "RHSA-2015:0988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0988" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1012", "reference_id": "RHSA-2015:1012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1011", "reference_id": "RHSA-2020:1011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2508", "reference_id": "RHSA-2020:2508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2508" }, { "reference_url": "https://usn.ubuntu.com/2602-1/", "reference_id": "USN-2602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2602-1/" }, { "reference_url": "https://usn.ubuntu.com/2603-1/", "reference_id": "USN-2603-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2603-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2716" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55t4-7jnq-j7fx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57038?format=api", "vulnerability_id": "VCID-63hm-xmht-g3cp", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1592.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1592.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1592", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82678", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82569", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82637", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82675", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82599", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82621", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82647", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01768", "scoring_system": "epss", "scoring_elements": "0.82642", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1592" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1088635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1088635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3090" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3092", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3092" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-87.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-87.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/71398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71398" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169208", "reference_id": "1169208", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169208" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1592", "reference_id": "CVE-2014-1592", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1592" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-87", "reference_id": "mfsa2014-87", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-87" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1919", "reference_id": "RHSA-2014:1919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1924", "reference_id": "RHSA-2014:1924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1924" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" }, { "reference_url": "https://usn.ubuntu.com/2428-1/", "reference_id": "USN-2428-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2428-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-1592" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-63hm-xmht-g3cp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41214?format=api", "vulnerability_id": "VCID-7yp8-9btm-zqgn", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2743.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2743.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77799", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.7771", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77717", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77744", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77727", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77755", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.7776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77786", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.7777", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77806", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77805", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236964", "reference_id": "1236964", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236964" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-69", "reference_id": "mfsa2015-69", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-69" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2743" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7yp8-9btm-zqgn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41112?format=api", "vulnerability_id": "VCID-82k6-qk5e-cuag", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2729", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61557", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61402", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61478", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61507", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61477", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61524", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61539", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61561", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61548", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61527", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61569", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61573", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2729" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236952", "reference_id": "1236952", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236952" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729", "reference_id": "CVE-2015-2729", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-62", "reference_id": "mfsa2015-62", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-62" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2729" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-82k6-qk5e-cuag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51651?format=api", "vulnerability_id": "VCID-89pc-vcy3-tkd7", "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n the worst of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2718", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30703", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30739", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30865", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30911", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30731", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30789", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30821", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30822", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30778", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30733", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30757", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30738", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2718" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220609", "reference_id": "1220609", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718", "reference_id": "CVE-2015-2718", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-56", "reference_id": "mfsa2015-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-56" }, { "reference_url": "https://usn.ubuntu.com/2602-1/", "reference_id": "USN-2602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2602-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2718" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-89pc-vcy3-tkd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57035?format=api", "vulnerability_id": "VCID-8s1b-yh8y-cbdk", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1587.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1587.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1587", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81995", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.8189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81993", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81901", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81924", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.8192", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81947", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81954", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81974", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81963", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1587" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1042567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1042567" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072847" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079729" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1080312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1080312" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1089207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1089207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3090" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3092", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3092" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-83.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-83.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/71391", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71391" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169201", "reference_id": "1169201", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169201" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1587", "reference_id": "CVE-2014-1587", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1587" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-83", "reference_id": "mfsa2014-83", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-83" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1919", "reference_id": "RHSA-2014:1919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1924", "reference_id": "RHSA-2014:1924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1924" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" }, { "reference_url": "https://usn.ubuntu.com/2428-1/", "reference_id": "USN-2428-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2428-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-1587" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8s1b-yh8y-cbdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58189?format=api", "vulnerability_id": "VCID-9bat-kqxd-gkg2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8634.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8634.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8634", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82586", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82474", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82502", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82529", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82536", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82555", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.8255", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82545", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82582", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180962", "reference_id": "1180962", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180962" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-01", "reference_id": "mfsa2015-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0046", "reference_id": "RHSA-2015:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0047", "reference_id": "RHSA-2015:0047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0047" }, { "reference_url": "https://usn.ubuntu.com/2458-1/", "reference_id": "USN-2458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2458-1/" }, { "reference_url": "https://usn.ubuntu.com/2460-1/", "reference_id": "USN-2460-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2460-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-8634" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9bat-kqxd-gkg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61307?format=api", "vulnerability_id": "VCID-9e6r-hnyd-6ufr", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0834", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66612", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66501", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.6654", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66566", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66538", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66586", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66599", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66618", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66606", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66573", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66609", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66627", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0834" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195616", "reference_id": "1195616", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834", "reference_id": "CVE-2015-0834", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-15", "reference_id": "mfsa2015-15", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-15" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0834" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9e6r-hnyd-6ufr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56970?format=api", "vulnerability_id": "VCID-cjda-dm64-kqg2", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1574.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1574.json" }, { "reference_url": "https://advisories.mageia.org/MGASA-2014-0421.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://advisories.mageia.org/MGASA-2014-0421.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1574", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.82001", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81964", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81999", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81908", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.8193", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81927", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81961", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.8198", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01644", "scoring_system": "epss", "scoring_elements": "0.81969", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1574" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1011354", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1011354" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1061214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1061214" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1061600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1061600" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064346" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072044", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072044" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" }, { "reference_url": "http://secunia.com/advisories/61387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61387" }, { "reference_url": "http://secunia.com/advisories/61854", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61854" }, { "reference_url": "http://secunia.com/advisories/62021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62021" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3050" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3061" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-74.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-74.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/70436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70436" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.securitytracker.com/id/1031030", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031030" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2373-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2373-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152356", "reference_id": "1152356", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152356" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1574", "reference_id": "CVE-2014-1574", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1574" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-74", "reference_id": "mfsa2014-74", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-74" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1635", "reference_id": "RHSA-2014:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1635" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1647", "reference_id": "RHSA-2014:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1647" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" }, { "reference_url": "https://usn.ubuntu.com/2373-1/", "reference_id": "USN-2373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2373-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-1574" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cjda-dm64-kqg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63733?format=api", "vulnerability_id": "VCID-ct72-956e-qyef", "summary": "Paul Theriault of Mozilla discovered a privacy issue with a WiFi-related system\nmessage that wasn't properly restricted to apps with the \"wifi-manage\" permission. As a result,\neven unprivileged apps could have received those messages, allowing them to extract limited\ninformation from a vulnerable Firefox OS device under certain rare conditions.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4494", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49683", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49617", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49646", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49674", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49626", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49681", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49675", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49693", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49666", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49714", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49712", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4494", "reference_id": "CVE-2015-4494", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4494" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-76", "reference_id": "mfsa2015-76", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-76" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-4494" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ct72-956e-qyef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61300?format=api", "vulnerability_id": "VCID-dm6s-ammq-33dp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0825", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71249", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71146", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71149", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71191", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71226", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71212", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71196", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71242", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0825" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195631", "reference_id": "1195631", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825", "reference_id": "CVE-2015-0825", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-21", "reference_id": "mfsa2015-21", "reference_type": "", "scores": [ { "value": "medium", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-21" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0825" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dm6s-ammq-33dp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63715?format=api", "vulnerability_id": "VCID-duj8-zd4h-u7at", "summary": "Security researcher Muneaki Nishimura reported an issue with Gaia's System app\nwhich allows an attacker to inject HTML code into the System app's context via specially-crafted\nsearch links. The injection occurs when the user opens such malicious link in the browser and then\npresses the HOME button or uses the Show Windows function.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2745", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55283", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55136", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55237", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.5526", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55239", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55289", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.5529", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55301", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55281", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55262", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55304", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2745", "reference_id": "CVE-2015-2745", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2745" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-73", "reference_id": "mfsa2015-73", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-73" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2745" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-duj8-zd4h-u7at" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41005?format=api", "vulnerability_id": "VCID-e193-1kgh-5kda", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0805", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82184", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82088", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82105", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82132", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82158", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82149", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82181", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0805" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207078", "reference_id": "1207078", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805", "reference_id": "CVE-2015-0805", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-38", "reference_id": "mfsa2015-38", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-38" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0805" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e193-1kgh-5kda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57041?format=api", "vulnerability_id": "VCID-e1ef-b4f7-7yd8", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1594.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1594.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1594", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82291", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82183", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.8229", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82289", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82217", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82213", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82239", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82247", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82266", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82259", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82253", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1594" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3090" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3092", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3092" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-89.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-89.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/71396", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71396" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169210", "reference_id": "1169210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169210" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1594", "reference_id": "CVE-2014-1594", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1594" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-89", "reference_id": "mfsa2014-89", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-89" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1919", "reference_id": "RHSA-2014:1919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1924", "reference_id": "RHSA-2014:1924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1924" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" }, { "reference_url": "https://usn.ubuntu.com/2428-1/", "reference_id": "USN-2428-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2428-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-1594" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e1ef-b4f7-7yd8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59587?format=api", "vulnerability_id": "VCID-ep8z-jvbx-rqcj", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81105", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81002", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81034", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81062", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81068", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81086", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81072", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81065", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81103", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0836" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195605", "reference_id": "1195605", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195605" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-11", "reference_id": "mfsa2015-11", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0836" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ep8z-jvbx-rqcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58191?format=api", "vulnerability_id": "VCID-f1nz-g5h1-m7dm", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8638.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8638.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8638", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65834", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65713", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65763", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65793", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65758", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65811", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65822", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65842", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65828", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65798", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65832", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65846", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180966", "reference_id": "1180966", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180966" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-03", "reference_id": "mfsa2015-03", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0046", "reference_id": "RHSA-2015:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0047", "reference_id": "RHSA-2015:0047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0047" }, { "reference_url": "https://usn.ubuntu.com/2458-1/", "reference_id": "USN-2458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2458-1/" }, { "reference_url": "https://usn.ubuntu.com/2460-1/", "reference_id": "USN-2460-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2460-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-8638" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f1nz-g5h1-m7dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41217?format=api", "vulnerability_id": "VCID-fasa-11uc-jucq", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4495.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4495.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4495", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.98718", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.9873", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.98727", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.98731", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.98733", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.98723", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.98734", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.71568", "scoring_system": "epss", "scoring_elements": "0.98719", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4495" }, { "reference_url": "http://www.securitytracker.com/id/1033216", "reference_id": "1033216", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://www.securitytracker.com/id/1033216" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1251318", "reference_id": "1251318", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1251318" }, { "reference_url": "https://www.exploit-db.com/exploits/37772/", "reference_id": "37772", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "https://www.exploit-db.com/exploits/37772/" }, { "reference_url": "http://www.securityfocus.com/bid/76249", "reference_id": "76249", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://www.securityfocus.com/bid/76249" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495", "reference_id": "CVE-2015-4495", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/37772.js", "reference_id": "CVE-2015-4495;OSVDB-125839", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/37772.js" }, { "reference_url": "https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/", "reference_id": "firefox-exploit-found-in-the-wild", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-78", "reference_id": "mfsa2015-78", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-78" }, { "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-78.html", "reference_id": "mfsa2015-78.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-78.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html", "reference_id": "msg00009.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html", "reference_id": "msg00014.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html", "reference_id": "msg00016.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html", "reference_id": "msg00021.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1581", "reference_id": "RHSA-2015:1581", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1581" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1581.html", "reference_id": "RHSA-2015-1581.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1581.html" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1178058", "reference_id": "show_bug.cgi?id=1178058", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1178058" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1179262", "reference_id": "show_bug.cgi?id=1179262", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1179262" }, { "reference_url": "https://usn.ubuntu.com/2707-1/", "reference_id": "USN-2707-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2707-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2707-1", "reference_id": "USN-2707-1", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2707-1" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-4495" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fasa-11uc-jucq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40999?format=api", "vulnerability_id": "VCID-ffrc-3bx6-jbav", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0801", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78867", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78795", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78802", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78832", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78815", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.7884", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78846", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.7887", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78853", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78843", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78872", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78869", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207084", "reference_id": "1207084", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207084" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-40", "reference_id": "mfsa2015-40", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-40" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766", "reference_id": "RHSA-2015:0766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771", "reference_id": "RHSA-2015:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0771" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" }, { "reference_url": "https://usn.ubuntu.com/2552-1/", "reference_id": "USN-2552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0801" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ffrc-3bx6-jbav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51628?format=api", "vulnerability_id": "VCID-ghtc-dh9g-2ufb", "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n the worst of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2708", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79965", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79885", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79892", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79913", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79901", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79929", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79938", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79958", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79941", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79962", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220597", "reference_id": "1220597", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220597" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-46", "reference_id": "mfsa2015-46", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-46" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988", "reference_id": "RHSA-2015:0988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0988" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1012", "reference_id": "RHSA-2015:1012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1012" }, { "reference_url": "https://usn.ubuntu.com/2602-1/", "reference_id": "USN-2602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2602-1/" }, { "reference_url": "https://usn.ubuntu.com/2603-1/", "reference_id": "USN-2603-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2603-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2708" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ghtc-dh9g-2ufb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41053?format=api", "vulnerability_id": "VCID-gr7k-2v4p-kbfg", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0816", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99367", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99359", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99361", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99363", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99364", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99365", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99366", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.8537", "scoring_system": "epss", "scoring_elements": "0.99368", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0816" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207072", "reference_id": "1207072", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207072" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-33", "reference_id": "mfsa2015-33", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766", "reference_id": "RHSA-2015:0766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771", "reference_id": "RHSA-2015:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0771" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" }, { "reference_url": "https://usn.ubuntu.com/2552-1/", "reference_id": "USN-2552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0816" ], "risk_score": 1.6, "exploitability": "2.0", "weighted_severity": "0.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gr7k-2v4p-kbfg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41045?format=api", "vulnerability_id": "VCID-grdt-g3kf-3uh3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0815", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79395", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79314", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79321", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.7933", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79356", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79365", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79389", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79373", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79362", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79394", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01254", "scoring_system": "epss", "scoring_elements": "0.79392", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207068", "reference_id": "1207068", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207068" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-30", "reference_id": "mfsa2015-30", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766", "reference_id": "RHSA-2015:0766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771", "reference_id": "RHSA-2015:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0771" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" }, { "reference_url": "https://usn.ubuntu.com/2552-1/", "reference_id": "USN-2552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0815" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-grdt-g3kf-3uh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61292?format=api", "vulnerability_id": "VCID-gx4v-yve4-gbga", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8640.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8640.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8640", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78438", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78359", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78366", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78397", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.7838", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78407", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78412", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01542", "scoring_system": "epss", "scoring_elements": "0.81411", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01542", "scoring_system": "epss", "scoring_elements": "0.81381", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01542", "scoring_system": "epss", "scoring_elements": "0.81374", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180970", "reference_id": "1180970", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640", "reference_id": "CVE-2014-8640", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-05", "reference_id": "mfsa2015-05", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-05" }, { "reference_url": "https://usn.ubuntu.com/2458-1/", "reference_id": "USN-2458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2458-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-8640" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gx4v-yve4-gbga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56976?format=api", "vulnerability_id": "VCID-hb1k-vzww-8bbm", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1581.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1581.json" }, { "reference_url": "https://advisories.mageia.org/MGASA-2014-0421.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://advisories.mageia.org/MGASA-2014-0421.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1581", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84773", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84678", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84774", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84775", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84715", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84744", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02306", "scoring_system": "epss", "scoring_elements": "0.84752", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1581" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1068218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1068218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" }, { "reference_url": "http://secunia.com/advisories/61387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61387" }, { "reference_url": "http://secunia.com/advisories/61854", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61854" }, { "reference_url": "http://secunia.com/advisories/62021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62021" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3050" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3061" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-79.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-79.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/70426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70426" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.securitytracker.com/id/1031030", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031030" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2373-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2373-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152363", "reference_id": "1152363", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152363" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1581", "reference_id": "CVE-2014-1581", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1581" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-79", "reference_id": "mfsa2014-79", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-79" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1635", "reference_id": "RHSA-2014:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1635" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1647", "reference_id": "RHSA-2014:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1647" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" }, { "reference_url": "https://usn.ubuntu.com/2373-1/", "reference_id": "USN-2373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2373-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-1581" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hb1k-vzww-8bbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59581?format=api", "vulnerability_id": "VCID-jj3q-bub2-y3b2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70519", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70403", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70417", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70434", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70413", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70458", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70474", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70498", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70483", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70468", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70511", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195638", "reference_id": "1195638", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195638" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-24", "reference_id": "mfsa2015-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0822" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jj3q-bub2-y3b2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41122?format=api", "vulnerability_id": "VCID-jmhk-12t1-kugh", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2730", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45529", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.4544", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45514", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45536", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45482", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45537", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45538", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45558", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45527", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45533", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45581", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45578", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236954", "reference_id": "1236954", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236954" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-64", "reference_id": "mfsa2015-64", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-64" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1664", "reference_id": "RHSA-2015:1664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1699", "reference_id": "RHSA-2015:1699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1699" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2672-1/", "reference_id": "USN-2672-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2672-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2730" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jmhk-12t1-kugh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41010?format=api", "vulnerability_id": "VCID-jnj4-g593-37d7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0811", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7348", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73385", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73394", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73417", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73389", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73426", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7344", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73463", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73443", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73435", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73478", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73487", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0811" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207073", "reference_id": "1207073", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207073" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811", "reference_id": "CVE-2015-0811", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-34", "reference_id": "mfsa2015-34", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-34" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0811" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnj4-g593-37d7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59584?format=api", "vulnerability_id": "VCID-k69z-4hzh-5yd4", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76987", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76886", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76893", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76923", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76905", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76937", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76976", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76955", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76951", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76992", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76994", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195623", "reference_id": "1195623", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195623" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-19", "reference_id": "mfsa2015-19", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0827" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k69z-4hzh-5yd4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41161?format=api", "vulnerability_id": "VCID-kyhs-j9aj-vqft", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79367", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79293", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.793", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79324", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.7931", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79345", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79369", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79353", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79343", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.7937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01252", "scoring_system": "epss", "scoring_elements": "0.79365", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956", "reference_id": "1236956", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66", "reference_id": "mfsa2015-66", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455", "reference_id": "RHSA-2015:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1455" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2734" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kyhs-j9aj-vqft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41090?format=api", "vulnerability_id": "VCID-mwyu-5rk2-xbbz", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69706", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69606", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69619", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69635", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69614", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69665", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69682", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69704", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69689", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69676", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69717", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00607", "scoring_system": "epss", "scoring_elements": "0.69725", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236967", "reference_id": "1236967", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236967" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://security.gentoo.org/glsa/201701-46", "reference_id": "GLSA-201701-46", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-46" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-71", "reference_id": "mfsa2015-71", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-71" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1185", "reference_id": "RHSA-2015:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1664", "reference_id": "RHSA-2015:1664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1664" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2672-1/", "reference_id": "USN-2672-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2672-1/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2721" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mwyu-5rk2-xbbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51648?format=api", "vulnerability_id": "VCID-nav6-hsaf-2fbj", "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n the worst of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2715", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01381", "scoring_system": "epss", "scoring_elements": "0.80311", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01381", "scoring_system": "epss", "scoring_elements": "0.80224", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01381", "scoring_system": "epss", "scoring_elements": "0.80232", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01381", "scoring_system": "epss", "scoring_elements": "0.80252", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01381", "scoring_system": "epss", "scoring_elements": "0.8024", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01381", "scoring_system": "epss", "scoring_elements": "0.80268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01381", "scoring_system": "epss", "scoring_elements": "0.80278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01381", "scoring_system": "epss", "scoring_elements": "0.80297", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01381", "scoring_system": "epss", "scoring_elements": "0.80282", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01381", "scoring_system": "epss", "scoring_elements": "0.80275", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01381", "scoring_system": "epss", "scoring_elements": "0.80306", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01381", "scoring_system": "epss", "scoring_elements": "0.80307", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2715" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220606", "reference_id": "1220606", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715", "reference_id": "CVE-2015-2715", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-53", "reference_id": "mfsa2015-53", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-53" }, { "reference_url": "https://usn.ubuntu.com/2602-1/", "reference_id": "USN-2602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2602-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2715" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nav6-hsaf-2fbj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56966?format=api", "vulnerability_id": "VCID-qdev-8m9n-8bbr", "summary": "security update", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html" }, { "reference_url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html" }, { "reference_url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698", "reference_id": "", "reference_type": "", "scores": [], "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698" }, { "reference_url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761", "reference_id": "", "reference_type": "", "scores": [], "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1307.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1307.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1371.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1371.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1568", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.9675", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.96734", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.96737", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.96743", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.96747", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.96718", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.96722", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.9673", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.30935", "scoring_system": "epss", "scoring_elements": "0.96731", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.34437", "scoring_system": "epss", "scoring_elements": "0.96962", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.34437", "scoring_system": "epss", "scoring_elements": "0.9697", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1568" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064636" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1069405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1069405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568" }, { "reference_url": "http://secunia.com/advisories/61540", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61540" }, { "reference_url": "http://secunia.com/advisories/61574", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61574" }, { "reference_url": "http://secunia.com/advisories/61575", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61575" }, { "reference_url": "http://secunia.com/advisories/61576", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61576" }, { "reference_url": "http://secunia.com/advisories/61583", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61583" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96194" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3033", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3033" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3034", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3034" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3037", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3037" }, { "reference_url": "http://www.kb.cert.org/vuls/id/772676", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/772676" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html" }, { "reference_url": "http://www.novell.com/support/kb/doc.php?id=7015701", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/support/kb/doc.php?id=7015701" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "reference_url": "http://www.securityfocus.com/bid/70116", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70116" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2360-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2360-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2360-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2360-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2361-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2361-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145429", "reference_id": "1145429", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145429" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1568", "reference_id": "CVE-2014-1568", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1568" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-73", "reference_id": "mfsa2014-73", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-73" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1307", "reference_id": "RHSA-2014:1307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1354", "reference_id": "RHSA-2014:1354", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1354" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1371", "reference_id": "RHSA-2014:1371", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1371" }, { "reference_url": "https://usn.ubuntu.com/2360-1/", "reference_id": "USN-2360-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2360-1/" }, { "reference_url": "https://usn.ubuntu.com/2360-2/", "reference_id": "USN-2360-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2360-2/" }, { "reference_url": "https://usn.ubuntu.com/2361-1/", "reference_id": "USN-2361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2361-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-1568" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qdev-8m9n-8bbr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41094?format=api", "vulnerability_id": "VCID-qj59-9xmk-7yg9", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2722", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84795", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84701", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84716", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84736", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84738", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.8476", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84785", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.8478", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84774", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84796", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02313", "scoring_system": "epss", "scoring_elements": "0.84797", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236955", "reference_id": "1236955", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236955" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722", "reference_id": "CVE-2015-2722", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-65", "reference_id": "mfsa2015-65", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-65" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2722" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qj59-9xmk-7yg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61277?format=api", "vulnerability_id": "VCID-qpzb-b3nx-m3cv", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1591.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1591.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1591", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50686", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.5057", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50701", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50707", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50622", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50649", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50604", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50659", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50655", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50698", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50675", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.5066", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1591" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1069762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1069762" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-86.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-86.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169207", "reference_id": "1169207", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169207" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591", "reference_id": "CVE-2014-1591", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1591", "reference_id": "CVE-2014-1591", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1591" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-86", "reference_id": "mfsa2014-86", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-86" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-1591" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qpzb-b3nx-m3cv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56973?format=api", "vulnerability_id": "VCID-r56k-pzrk-kfbb", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1635.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1647.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1577.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1577.json" }, { "reference_url": "https://advisories.mageia.org/MGASA-2014-0421.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://advisories.mageia.org/MGASA-2014-0421.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1577", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79666", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79581", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79632", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79662", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79588", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79611", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79598", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79626", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79634", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79655", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79639", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1577" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1012609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1012609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" }, { "reference_url": "http://secunia.com/advisories/61387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61387" }, { "reference_url": "http://secunia.com/advisories/61854", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61854" }, { "reference_url": "http://secunia.com/advisories/62021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62021" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3050" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3061" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-76.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-76.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/70440", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70440" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.securitytracker.com/id/1031030", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031030" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2373-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2373-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152359", "reference_id": "1152359", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152359" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1577", "reference_id": "CVE-2014-1577", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1577" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-76", "reference_id": "mfsa2014-76", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-76" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1635", "reference_id": "RHSA-2014:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1635" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1647", "reference_id": "RHSA-2014:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1647" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" }, { "reference_url": "https://usn.ubuntu.com/2373-1/", "reference_id": "USN-2373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2373-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-1577" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r56k-pzrk-kfbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51650?format=api", "vulnerability_id": "VCID-r7v8-qp3e-cua2", "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n the worst of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2717", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85152", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85058", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85071", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85088", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85093", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85114", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85121", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85136", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85133", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.8513", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85151", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85154", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2717" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220608", "reference_id": "1220608", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220608" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717", "reference_id": "CVE-2015-2717", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-55", "reference_id": "mfsa2015-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-55" }, { "reference_url": "https://usn.ubuntu.com/2602-1/", "reference_id": "USN-2602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2602-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2717" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7v8-qp3e-cua2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58197?format=api", "vulnerability_id": "VCID-r8f9-h598-7bg5", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8641.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8641.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8641", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81298", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81197", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81205", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81228", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81256", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81282", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81268", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.8126", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81297", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180973", "reference_id": "1180973", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180973" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-06", "reference_id": "mfsa2015-06", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0046", "reference_id": "RHSA-2015:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0046" }, { "reference_url": "https://usn.ubuntu.com/2458-1/", "reference_id": "USN-2458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2458-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-8641" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r8f9-h598-7bg5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34739?format=api", "vulnerability_id": "VCID-rzqy-gheq-cqgg", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites allowing remote attackers to remotely execute arbitrary\n code, obtain information, and cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.93743", "scoring_system": "epss", "scoring_elements": "0.99851", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.93743", "scoring_system": "epss", "scoring_elements": "0.99852", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.93894", "scoring_system": "epss", "scoring_elements": "0.99875", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.93894", "scoring_system": "epss", "scoring_elements": "0.99876", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.939", "scoring_system": "epss", "scoring_elements": "0.99875", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.939", "scoring_system": "epss", "scoring_elements": "0.99877", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.939", "scoring_system": "epss", "scoring_elements": "0.99874", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.939", "scoring_system": "epss", "scoring_elements": "0.99873", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.939", "scoring_system": "epss", "scoring_elements": "0.99876", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211", "reference_id": "1223211", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211" }, { "reference_url": "https://security.gentoo.org/glsa/201506-02", "reference_id": "GLSA-201506-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201506-02" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://security.gentoo.org/glsa/201603-11", "reference_id": "GLSA-201603-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-11" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://security.gentoo.org/glsa/201701-46", "reference_id": "GLSA-201701-46", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-46" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-70", "reference_id": "mfsa2015-70", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-70" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1072", "reference_id": "RHSA-2015:1072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1185", "reference_id": "RHSA-2015:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1197", "reference_id": "RHSA-2015:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1228", "reference_id": "RHSA-2015:1228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1229", "reference_id": "RHSA-2015:1229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1230", "reference_id": "RHSA-2015:1230", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1230" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1241", "reference_id": "RHSA-2015:1241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1241" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1242", "reference_id": "RHSA-2015:1242", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1243", "reference_id": "RHSA-2015:1243", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1243" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1485", "reference_id": "RHSA-2015:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1486", "reference_id": "RHSA-2015:1486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1488", "reference_id": "RHSA-2015:1488", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1488" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1526", "reference_id": "RHSA-2015:1526", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1526" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1544", "reference_id": "RHSA-2015:1544", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1544" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1604", "reference_id": "RHSA-2015:1604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2056", "reference_id": "RHSA-2016:2056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2056" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" }, { "reference_url": "https://usn.ubuntu.com/2696-1/", "reference_id": "USN-2696-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2696-1/" }, { "reference_url": "https://usn.ubuntu.com/2706-1/", "reference_id": "USN-2706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2706-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-4000" ], "risk_score": 7.2, "exploitability": "2.0", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqy-gheq-cqgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51694?format=api", "vulnerability_id": "VCID-tsmv-w2tb-hyht", "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n the worst of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4487", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02676", "scoring_system": "epss", "scoring_elements": "0.85846", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02676", "scoring_system": "epss", "scoring_elements": "0.85754", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02676", "scoring_system": "epss", "scoring_elements": "0.85767", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02676", "scoring_system": "epss", "scoring_elements": "0.85785", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02676", "scoring_system": "epss", "scoring_elements": "0.85791", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02676", "scoring_system": "epss", "scoring_elements": "0.8581", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02676", "scoring_system": "epss", "scoring_elements": "0.8582", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02676", "scoring_system": "epss", "scoring_elements": "0.85835", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02676", "scoring_system": "epss", "scoring_elements": "0.85832", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02676", "scoring_system": "epss", "scoring_elements": "0.85828", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02676", "scoring_system": "epss", "scoring_elements": "0.85847", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02676", "scoring_system": "epss", "scoring_elements": "0.85851", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252293", "reference_id": "1252293", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252293" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-90", "reference_id": "mfsa2015-90", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-90" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1586", "reference_id": "RHSA-2015:1586", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1586" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1682", "reference_id": "RHSA-2015:1682", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1682" }, { "reference_url": "https://usn.ubuntu.com/2702-1/", "reference_id": "USN-2702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2702-1/" }, { "reference_url": "https://usn.ubuntu.com/2712-1/", "reference_id": "USN-2712-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2712-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/86796?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0" } ], "aliases": [ "CVE-2015-4487" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsmv-w2tb-hyht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57036?format=api", "vulnerability_id": "VCID-vhpz-366r-hbg1", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1590.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1590.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1590", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77242", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77147", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77249", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77251", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77154", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77183", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77165", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77198", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77206", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77234", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77213", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01019", "scoring_system": "epss", "scoring_elements": "0.77209", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1590" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1087633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1087633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3090" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3092", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3092" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-85.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-85.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securityfocus.com/bid/71397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71397" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169206", "reference_id": "1169206", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169206" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1590", "reference_id": "CVE-2014-1590", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1590" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-85", "reference_id": "mfsa2014-85", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-85" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1919", "reference_id": "RHSA-2014:1919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1924", "reference_id": "RHSA-2014:1924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1924" }, { "reference_url": "https://usn.ubuntu.com/2424-1/", "reference_id": "USN-2424-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2424-1/" }, { "reference_url": "https://usn.ubuntu.com/2428-1/", "reference_id": "USN-2428-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2428-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-1590" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vhpz-366r-hbg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61304?format=api", "vulnerability_id": "VCID-w63q-84j6-h7dk", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0830", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76285", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76198", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.7623", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.7621", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76242", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76256", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76282", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76259", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76255", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76296", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.763", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0830" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195613", "reference_id": "1195613", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830", "reference_id": "CVE-2015-0830", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-14", "reference_id": "mfsa2015-14", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-14" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0830" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w63q-84j6-h7dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41095?format=api", "vulnerability_id": "VCID-xjf8-mc7t-hfah", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75882", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75798", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75802", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75835", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75813", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75845", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75857", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75881", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75862", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75855", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75893", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75896", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236947", "reference_id": "1236947", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236947" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-59", "reference_id": "mfsa2015-59", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-59" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455", "reference_id": "RHSA-2015:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1455" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" }, { "reference_url": "https://usn.ubuntu.com/2673-1/", "reference_id": "USN-2673-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2673-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2724" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xjf8-mc7t-hfah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41109?format=api", "vulnerability_id": "VCID-xqxf-cnpj-3qas", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77778", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.7769", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77697", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77707", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77735", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.7774", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77751", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.7775", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77786", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01072", "scoring_system": "epss", "scoring_elements": "0.77785", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236951", "reference_id": "1236951", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236951" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-61", "reference_id": "mfsa2015-61", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-61" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207", "reference_id": "RHSA-2015:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1207" }, { "reference_url": "https://usn.ubuntu.com/2656-1/", "reference_id": "USN-2656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-1/" }, { "reference_url": "https://usn.ubuntu.com/2656-2/", "reference_id": "USN-2656-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2656-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2728" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqxf-cnpj-3qas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61266?format=api", "vulnerability_id": "VCID-xs3q-48t9-1qgn", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1580.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1580.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1580", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63942", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63818", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63897", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63932", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63879", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63906", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63863", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63914", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63931", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63944", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.6393", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1580" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1063733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1063733" }, { "reference_url": "http://secunia.com/advisories/62022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62022" }, { "reference_url": "http://secunia.com/advisories/62023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62023" }, { "reference_url": "http://www.mozilla.org/security/announce/2014/mfsa2014-78.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-78.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securityfocus.com/bid/70431", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70431" }, { "reference_url": "http://www.securitytracker.com/id/1031028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031028" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2372-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2372-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152362", "reference_id": "1152362", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152362" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580", "reference_id": "CVE-2014-1580", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1580", "reference_id": "CVE-2014-1580", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1580" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-78", "reference_id": "mfsa2014-78", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2014-78" }, { "reference_url": "https://usn.ubuntu.com/2372-1/", "reference_id": "USN-2372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2372-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2014-1580" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xs3q-48t9-1qgn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51631?format=api", "vulnerability_id": "VCID-xx39-5rg1-b3am", "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n the worst of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2710", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85154", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85058", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85071", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85088", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85092", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85114", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85121", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85135", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85133", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.8513", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02421", "scoring_system": "epss", "scoring_elements": "0.85151", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220601", "reference_id": "1220601", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220601" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-48", "reference_id": "mfsa2015-48", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-48" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988", "reference_id": "RHSA-2015:0988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0988" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1012", "reference_id": "RHSA-2015:1012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1012" }, { "reference_url": "https://usn.ubuntu.com/2602-1/", "reference_id": "USN-2602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2602-1/" }, { "reference_url": "https://usn.ubuntu.com/2603-1/", "reference_id": "USN-2603-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2603-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2710" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xx39-5rg1-b3am" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41007?format=api", "vulnerability_id": "VCID-ys1x-t7un-ayhr", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0807", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33497", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33485", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33639", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33673", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33512", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33556", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.3359", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33584", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33543", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33519", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33554", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33531", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207076", "reference_id": "1207076", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207076" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-37", "reference_id": "mfsa2015-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-37" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766", "reference_id": "RHSA-2015:0766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771", "reference_id": "RHSA-2015:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0771" }, { "reference_url": "https://usn.ubuntu.com/2550-1/", "reference_id": "USN-2550-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2550-1/" }, { "reference_url": "https://usn.ubuntu.com/2552-1/", "reference_id": "USN-2552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0807" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ys1x-t7un-ayhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63722?format=api", "vulnerability_id": "VCID-zca5-m2yy-zybb", "summary": "Security researcher Muneaki Nishimura reported an issue with Gaia's Search app\nwhich allows an attacker to inject HTML code into the System app's context via specially-crafted\nsearch links. The injection occurs when the user opens such malicious link in the browser and then\nre-opens the browser or opens the tab view.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2744", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.497", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49637", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49664", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49616", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49671", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49665", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49655", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49702", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2744", "reference_id": "CVE-2015-2744", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2744" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-72", "reference_id": "mfsa2015-72", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-72" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-2744" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zca5-m2yy-zybb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61303?format=api", "vulnerability_id": "VCID-zeyg-dbfj-93eg", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84385", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84291", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84304", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84324", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84326", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84347", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84352", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84363", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84359", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84381", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84382", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0829" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195620", "reference_id": "1195620", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829", "reference_id": "CVE-2015-0829", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-17", "reference_id": "mfsa2015-17", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-17" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0829" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zeyg-dbfj-93eg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61305?format=api", "vulnerability_id": "VCID-zxvq-vk4c-ebd9", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0832", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30639", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30796", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30662", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.3072", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30752", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30756", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30711", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30665", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30689", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30672", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0832" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195610", "reference_id": "1195610", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195610" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832", "reference_id": "CVE-2015-0832", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-13", "reference_id": "mfsa2015-13", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-13" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86743?format=api", "purl": "pkg:mozilla/Firefox%20OS@2.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" } ], "aliases": [ "CVE-2015-0832" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zxvq-vk4c-ebd9" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0" }