Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/86800?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "type": "mozilla", "namespace": "", "name": "Firefox", "version": "36.0.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "36.0.3", "latest_non_vulnerable_version": "150.0.1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59586?format=api", "vulnerability_id": "VCID-45ek-y9nx-j3cd", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83827", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83688", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83701", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83715", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83718", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83742", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83749", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83765", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83759", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83788", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83789", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.8379", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83814", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83823", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195619", "reference_id": "1195619", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195619" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-16", "reference_id": "mfsa2015-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0831" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45ek-y9nx-j3cd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61301?format=api", "vulnerability_id": "VCID-4dvq-ta2c-s7fp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0826.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0826.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0826", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.72018", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71898", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71906", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71924", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71897", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71935", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71947", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71971", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71954", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71936", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71978", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71982", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71967", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.72012", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.72019", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0826" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195629", "reference_id": "1195629", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826", "reference_id": "CVE-2015-0826", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-20", "reference_id": "mfsa2015-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-20" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0826" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4dvq-ta2c-s7fp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61297?format=api", "vulnerability_id": "VCID-5z4v-hqea-eucx", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0821.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0821.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0821", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80084", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.79955", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.79963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.79984", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.79973", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.8001", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.8003", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80014", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80006", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80034", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80036", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80063", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80068", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0821" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195639", "reference_id": "1195639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821", "reference_id": "CVE-2015-0821", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-25", "reference_id": "mfsa2015-25", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-25" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0821" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5z4v-hqea-eucx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61298?format=api", "vulnerability_id": "VCID-664r-gx3z-d7c6", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0823.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0823.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0823", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82404", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82261", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82274", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82294", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82288", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82315", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82322", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82342", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82336", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82365", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82368", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82389", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.824", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0823" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195636", "reference_id": "1195636", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0823", "reference_id": "CVE-2015-0823", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0823" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-23", "reference_id": "mfsa2015-23", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-23" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0823" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-664r-gx3z-d7c6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61307?format=api", "vulnerability_id": "VCID-9e6r-hnyd-6ufr", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0834", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.6665", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66501", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.6654", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66566", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66538", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66586", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66599", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66618", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66606", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66573", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66609", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66627", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66612", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66637", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00514", "scoring_system": "epss", "scoring_elements": "0.66651", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0834" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195616", "reference_id": "1195616", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834", "reference_id": "CVE-2015-0834", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-15", "reference_id": "mfsa2015-15", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-15" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0834" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9e6r-hnyd-6ufr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61299?format=api", "vulnerability_id": "VCID-ba82-rgap-z7ck", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0824.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0824.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81703", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81562", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81573", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81594", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81592", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.8162", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81645", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81632", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81663", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81666", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.8169", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81699", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0824" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195633", "reference_id": "1195633", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824", "reference_id": "CVE-2015-0824", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-22", "reference_id": "mfsa2015-22", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-22" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0824" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ba82-rgap-z7ck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61295?format=api", "vulnerability_id": "VCID-crfx-bba1-97b6", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0819.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0819.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0819", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75947", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75804", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75808", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.7584", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75819", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75852", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75864", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75887", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75868", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75862", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75899", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75902", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75888", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75926", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75936", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0819" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195640", "reference_id": "1195640", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0819", "reference_id": "CVE-2015-0819", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0819" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-26", "reference_id": "mfsa2015-26", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-26" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0819" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-crfx-bba1-97b6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61300?format=api", "vulnerability_id": "VCID-dm6s-ammq-33dp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0825", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.7129", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71146", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71149", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71191", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71226", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71212", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71196", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71242", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71249", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71279", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71287", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0825" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195631", "reference_id": "1195631", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825", "reference_id": "CVE-2015-0825", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-21", "reference_id": "mfsa2015-21", "reference_type": "", "scores": [ { "value": "medium", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-21" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0825" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dm6s-ammq-33dp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59587?format=api", "vulnerability_id": "VCID-ep8z-jvbx-rqcj", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81141", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81002", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81034", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81062", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81068", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81086", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81072", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81065", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81103", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81105", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81126", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81134", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0836" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195605", "reference_id": "1195605", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195605" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-11", "reference_id": "mfsa2015-11", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0836" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ep8z-jvbx-rqcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59581?format=api", "vulnerability_id": "VCID-jj3q-bub2-y3b2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70558", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70403", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70417", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70434", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70413", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70458", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70474", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70498", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70483", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70468", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70511", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70519", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70549", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195638", "reference_id": "1195638", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195638" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-24", "reference_id": "mfsa2015-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0822" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jj3q-bub2-y3b2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59584?format=api", "vulnerability_id": "VCID-k69z-4hzh-5yd4", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.77042", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76886", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76893", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76923", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76905", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76937", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76976", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76955", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76951", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76992", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76994", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76987", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.77021", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.77028", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195623", "reference_id": "1195623", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195623" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-19", "reference_id": "mfsa2015-19", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0827" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k69z-4hzh-5yd4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61302?format=api", "vulnerability_id": "VCID-r39h-25hq-gbdz", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0828.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0828.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0828", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80227", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80095", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80102", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80109", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80139", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80145", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80164", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80148", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.8014", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.8017", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80171", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80173", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80203", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80212", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0828" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195621", "reference_id": "1195621", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828", "reference_id": "CVE-2015-0828", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-18", "reference_id": "mfsa2015-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-18" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0828" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r39h-25hq-gbdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61296?format=api", "vulnerability_id": "VCID-vjt1-8bvw-d7dp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0820", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56702", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56632", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56748", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56725", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56777", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56782", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5679", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56767", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56746", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56774", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56686", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0820" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820", "reference_id": "CVE-2015-0820", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-27", "reference_id": "mfsa2015-27", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-27" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0820" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vjt1-8bvw-d7dp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61304?format=api", "vulnerability_id": "VCID-w63q-84j6-h7dk", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0830", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76341", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76198", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.7623", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.7621", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76242", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76256", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76282", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76259", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76255", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76296", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.763", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76285", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76321", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76329", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0830" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195613", "reference_id": "1195613", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830", "reference_id": "CVE-2015-0830", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-14", "reference_id": "mfsa2015-14", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-14" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0830" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w63q-84j6-h7dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61306?format=api", "vulnerability_id": "VCID-xqqq-rk53-ubhp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0833", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.15984", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16027", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16025", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.1608", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16264", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16325", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16123", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16275", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16256", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16149", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16083", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16099", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16138", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0833" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833", "reference_id": "CVE-2015-0833", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-12", "reference_id": "mfsa2015-12", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-12" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-58", "reference_id": "mfsa2015-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-58" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api", "purl": "pkg:mozilla/Firefox@38.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0" } ], "aliases": [ "CVE-2015-0833" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqqq-rk53-ubhp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61303?format=api", "vulnerability_id": "VCID-zeyg-dbfj-93eg", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84425", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84291", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84304", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84324", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84326", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84347", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84352", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84363", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84359", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84381", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84382", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84385", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84411", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.8442", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0829" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195620", "reference_id": "1195620", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829", "reference_id": "CVE-2015-0829", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-17", "reference_id": "mfsa2015-17", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-17" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0829" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zeyg-dbfj-93eg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61305?format=api", "vulnerability_id": "VCID-zxvq-vk4c-ebd9", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0832", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30265", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30796", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30662", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.3072", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30752", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30756", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30711", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30665", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30689", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30672", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30639", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.3046", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30346", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0832" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195610", "reference_id": "1195610", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195610" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832", "reference_id": "CVE-2015-0832", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-13", "reference_id": "mfsa2015-13", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-13" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api", "purl": "pkg:mozilla/Firefox@36.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" } ], "aliases": [ "CVE-2015-0832" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zxvq-vk4c-ebd9" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0" }