Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/86801?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "type": "mozilla", "namespace": "", "name": "SeaMonkey", "version": "2.33.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.33.1", "latest_non_vulnerable_version": "2.38.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59586?format=api", "vulnerability_id": "VCID-45ek-y9nx-j3cd", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83788", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83688", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83701", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83715", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83718", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83742", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83749", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83765", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83759", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02019", "scoring_system": "epss", "scoring_elements": "0.83754", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195619", "reference_id": "1195619", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195619" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-16", "reference_id": "mfsa2015-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" } ], "aliases": [ "CVE-2015-0831" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45ek-y9nx-j3cd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61301?format=api", "vulnerability_id": "VCID-4dvq-ta2c-s7fp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0826.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0826.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0826", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71978", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71898", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71906", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71924", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71897", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71935", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71947", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71971", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71954", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71936", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0826" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195629", "reference_id": "1195629", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826", "reference_id": "CVE-2015-0826", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-20", "reference_id": "mfsa2015-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-20" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" } ], "aliases": [ "CVE-2015-0826" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4dvq-ta2c-s7fp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61297?format=api", "vulnerability_id": "VCID-5z4v-hqea-eucx", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0821.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0821.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0821", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80034", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.79955", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.79963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.79984", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.79973", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.8001", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.8003", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80014", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01339", "scoring_system": "epss", "scoring_elements": "0.80006", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0821" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195639", "reference_id": "1195639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821", "reference_id": "CVE-2015-0821", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-25", "reference_id": "mfsa2015-25", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-25" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" } ], "aliases": [ "CVE-2015-0821" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5z4v-hqea-eucx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61299?format=api", "vulnerability_id": "VCID-ba82-rgap-z7ck", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0824.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0824.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81663", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81562", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81573", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81594", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81592", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.8162", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81645", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81632", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0824" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195633", "reference_id": "1195633", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824", "reference_id": "CVE-2015-0824", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-22", "reference_id": "mfsa2015-22", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-22" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" } ], "aliases": [ "CVE-2015-0824" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ba82-rgap-z7ck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61300?format=api", "vulnerability_id": "VCID-dm6s-ammq-33dp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0825", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71242", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71146", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71149", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71191", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71226", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71212", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71196", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0825" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195631", "reference_id": "1195631", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825", "reference_id": "CVE-2015-0825", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-21", "reference_id": "mfsa2015-21", "reference_type": "", "scores": [ { "value": "medium", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-21" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" } ], "aliases": [ "CVE-2015-0825" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dm6s-ammq-33dp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59587?format=api", "vulnerability_id": "VCID-ep8z-jvbx-rqcj", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81103", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81002", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81034", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81062", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81068", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81086", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81072", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01493", "scoring_system": "epss", "scoring_elements": "0.81065", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0836" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195605", "reference_id": "1195605", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195605" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-11", "reference_id": "mfsa2015-11", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" } ], "aliases": [ "CVE-2015-0836" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ep8z-jvbx-rqcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59581?format=api", "vulnerability_id": "VCID-jj3q-bub2-y3b2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70511", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70403", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70417", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70434", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70413", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70458", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70474", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70498", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70483", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70468", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195638", "reference_id": "1195638", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195638" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-24", "reference_id": "mfsa2015-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" } ], "aliases": [ "CVE-2015-0822" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jj3q-bub2-y3b2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59584?format=api", "vulnerability_id": "VCID-k69z-4hzh-5yd4", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76992", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76886", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76893", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76923", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76905", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76937", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76976", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76955", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00997", "scoring_system": "epss", "scoring_elements": "0.76951", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195623", "reference_id": "1195623", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195623" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-19", "reference_id": "mfsa2015-19", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0265", "reference_id": "RHSA-2015:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0266", "reference_id": "RHSA-2015:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0629", "reference_id": "RHSA-2015:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0642", "reference_id": "RHSA-2015:0642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0642" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" }, { "reference_url": "https://usn.ubuntu.com/2506-1/", "reference_id": "USN-2506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2506-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" } ], "aliases": [ "CVE-2015-0827" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k69z-4hzh-5yd4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61302?format=api", "vulnerability_id": "VCID-r39h-25hq-gbdz", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0828.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0828.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0828", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.8017", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80095", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80102", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80109", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80139", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80145", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80164", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80148", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.8014", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0828" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195621", "reference_id": "1195621", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828", "reference_id": "CVE-2015-0828", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-18", "reference_id": "mfsa2015-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-18" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" } ], "aliases": [ "CVE-2015-0828" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r39h-25hq-gbdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61296?format=api", "vulnerability_id": "VCID-vjt1-8bvw-d7dp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0820", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56746", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56632", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56748", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56725", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56777", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56782", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5679", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56767", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0820" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820", "reference_id": "CVE-2015-0820", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-27", "reference_id": "mfsa2015-27", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-27" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" } ], "aliases": [ "CVE-2015-0820" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vjt1-8bvw-d7dp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61304?format=api", "vulnerability_id": "VCID-w63q-84j6-h7dk", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0830", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76296", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76198", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.7623", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.7621", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76242", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76256", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76282", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76259", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76255", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0830" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195613", "reference_id": "1195613", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830", "reference_id": "CVE-2015-0830", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-14", "reference_id": "mfsa2015-14", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-14" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" } ], "aliases": [ "CVE-2015-0830" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w63q-84j6-h7dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61306?format=api", "vulnerability_id": "VCID-xqqq-rk53-ubhp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0833", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16083", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16149", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.1608", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16264", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16325", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16123", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16275", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16256", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0833" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833", "reference_id": "CVE-2015-0833", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-12", "reference_id": "mfsa2015-12", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-12" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-58", "reference_id": "mfsa2015-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-58" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api", "purl": "pkg:mozilla/SeaMonkey@2.35.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0" } ], "aliases": [ "CVE-2015-0833" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqqq-rk53-ubhp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61303?format=api", "vulnerability_id": "VCID-zeyg-dbfj-93eg", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84381", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84291", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84304", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84324", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84326", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84347", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84352", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84363", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02182", "scoring_system": "epss", "scoring_elements": "0.84359", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0829" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195620", "reference_id": "1195620", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829", "reference_id": "CVE-2015-0829", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-17", "reference_id": "mfsa2015-17", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-17" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" } ], "aliases": [ "CVE-2015-0829" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zeyg-dbfj-93eg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61305?format=api", "vulnerability_id": "VCID-zxvq-vk4c-ebd9", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0832", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30689", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30796", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30662", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.3072", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30752", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30756", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30711", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30665", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0832" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195610", "reference_id": "1195610", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195610" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832", "reference_id": "CVE-2015-0832", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832" }, { "reference_url": "https://security.gentoo.org/glsa/201504-01", "reference_id": "GLSA-201504-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201504-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-13", "reference_id": "mfsa2015-13", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-13" }, { "reference_url": "https://usn.ubuntu.com/2505-1/", "reference_id": "USN-2505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2505-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api", "purl": "pkg:mozilla/SeaMonkey@2.33.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" } ], "aliases": [ "CVE-2015-0832" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zxvq-vk4c-ebd9" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0" }