Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/SeaMonkey@2.35.0
Typemozilla
Namespace
NameSeaMonkey
Version2.35.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.38.0
Latest_non_vulnerable_version2.38.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1p76-9qmf-bqgm
vulnerability_id VCID-1p76-9qmf-bqgm
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2727.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2727
reference_id
reference_type
scores
0
value 0.01076
scoring_system epss
scoring_elements 0.77836
published_at 2026-04-16T12:55:00Z
1
value 0.01076
scoring_system epss
scoring_elements 0.7774
published_at 2026-04-01T12:55:00Z
2
value 0.01076
scoring_system epss
scoring_elements 0.77747
published_at 2026-04-02T12:55:00Z
3
value 0.01076
scoring_system epss
scoring_elements 0.77773
published_at 2026-04-04T12:55:00Z
4
value 0.01076
scoring_system epss
scoring_elements 0.77757
published_at 2026-04-07T12:55:00Z
5
value 0.01076
scoring_system epss
scoring_elements 0.77785
published_at 2026-04-08T12:55:00Z
6
value 0.01076
scoring_system epss
scoring_elements 0.7779
published_at 2026-04-09T12:55:00Z
7
value 0.01076
scoring_system epss
scoring_elements 0.77816
published_at 2026-04-11T12:55:00Z
8
value 0.01076
scoring_system epss
scoring_elements 0.778
published_at 2026-04-12T12:55:00Z
9
value 0.01076
scoring_system epss
scoring_elements 0.77799
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2727
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236950
reference_id 1236950
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236950
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727
reference_id CVE-2015-2727
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-60
reference_id mfsa2015-60
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-60
6
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
7
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
8
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2727
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1p76-9qmf-bqgm
1
url VCID-51hn-ab8w-c7bn
vulnerability_id VCID-51hn-ab8w-c7bn
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2713
reference_id
reference_type
scores
0
value 0.01751
scoring_system epss
scoring_elements 0.82595
published_at 2026-04-16T12:55:00Z
1
value 0.01751
scoring_system epss
scoring_elements 0.8249
published_at 2026-04-01T12:55:00Z
2
value 0.01751
scoring_system epss
scoring_elements 0.82504
published_at 2026-04-02T12:55:00Z
3
value 0.01751
scoring_system epss
scoring_elements 0.82522
published_at 2026-04-04T12:55:00Z
4
value 0.01751
scoring_system epss
scoring_elements 0.82519
published_at 2026-04-07T12:55:00Z
5
value 0.01751
scoring_system epss
scoring_elements 0.82545
published_at 2026-04-08T12:55:00Z
6
value 0.01751
scoring_system epss
scoring_elements 0.82552
published_at 2026-04-09T12:55:00Z
7
value 0.01751
scoring_system epss
scoring_elements 0.82571
published_at 2026-04-11T12:55:00Z
8
value 0.01751
scoring_system epss
scoring_elements 0.82564
published_at 2026-04-12T12:55:00Z
9
value 0.01751
scoring_system epss
scoring_elements 0.82558
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2713
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220605
reference_id 1220605
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220605
9
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-51
reference_id mfsa2015-51
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-51
11
reference_url https://access.redhat.com/errata/RHSA-2015:0988
reference_id RHSA-2015:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0988
12
reference_url https://access.redhat.com/errata/RHSA-2015:1012
reference_id RHSA-2015:1012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1012
13
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
14
reference_url https://usn.ubuntu.com/2603-1/
reference_id USN-2603-1
reference_type
scores
url https://usn.ubuntu.com/2603-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2713
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-51hn-ab8w-c7bn
2
url VCID-55jd-xx14-d3h3
vulnerability_id VCID-55jd-xx14-d3h3
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0802
reference_id
reference_type
scores
0
value 0.80386
scoring_system epss
scoring_elements 0.99125
published_at 2026-04-16T12:55:00Z
1
value 0.80386
scoring_system epss
scoring_elements 0.99115
published_at 2026-04-01T12:55:00Z
2
value 0.80386
scoring_system epss
scoring_elements 0.99116
published_at 2026-04-02T12:55:00Z
3
value 0.80386
scoring_system epss
scoring_elements 0.99118
published_at 2026-04-04T12:55:00Z
4
value 0.80386
scoring_system epss
scoring_elements 0.99122
published_at 2026-04-07T12:55:00Z
5
value 0.80386
scoring_system epss
scoring_elements 0.99123
published_at 2026-04-09T12:55:00Z
6
value 0.80386
scoring_system epss
scoring_elements 0.99124
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0802
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207086
reference_id 1207086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207086
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802
reference_id CVE-2015-0802
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb
reference_id CVE-2015-0816;CVE-2015-0802;OSVDB-120107;OSVDB-119753
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb
5
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-42
reference_id mfsa2015-42
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-42
7
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0802
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55jd-xx14-d3h3
3
url VCID-55t4-7jnq-j7fx
vulnerability_id VCID-55t4-7jnq-j7fx
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2716
reference_id
reference_type
scores
0
value 0.05614
scoring_system epss
scoring_elements 0.90342
published_at 2026-04-16T12:55:00Z
1
value 0.05614
scoring_system epss
scoring_elements 0.90283
published_at 2026-04-01T12:55:00Z
2
value 0.05614
scoring_system epss
scoring_elements 0.90286
published_at 2026-04-02T12:55:00Z
3
value 0.05614
scoring_system epss
scoring_elements 0.90299
published_at 2026-04-04T12:55:00Z
4
value 0.05614
scoring_system epss
scoring_elements 0.90303
published_at 2026-04-07T12:55:00Z
5
value 0.05614
scoring_system epss
scoring_elements 0.90318
published_at 2026-04-08T12:55:00Z
6
value 0.05614
scoring_system epss
scoring_elements 0.90325
published_at 2026-04-09T12:55:00Z
7
value 0.05614
scoring_system epss
scoring_elements 0.90333
published_at 2026-04-11T12:55:00Z
8
value 0.05614
scoring_system epss
scoring_elements 0.90332
published_at 2026-04-12T12:55:00Z
9
value 0.05614
scoring_system epss
scoring_elements 0.90326
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2716
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220607
reference_id 1220607
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220607
9
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-54
reference_id mfsa2015-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-54
11
reference_url https://access.redhat.com/errata/RHSA-2015:0988
reference_id RHSA-2015:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0988
12
reference_url https://access.redhat.com/errata/RHSA-2015:1012
reference_id RHSA-2015:1012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1012
13
reference_url https://access.redhat.com/errata/RHSA-2020:1011
reference_id RHSA-2020:1011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1011
14
reference_url https://access.redhat.com/errata/RHSA-2020:2508
reference_id RHSA-2020:2508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2508
15
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
16
reference_url https://usn.ubuntu.com/2603-1/
reference_id USN-2603-1
reference_type
scores
url https://usn.ubuntu.com/2603-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2716
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55t4-7jnq-j7fx
4
url VCID-5ead-13an-2kcs
vulnerability_id VCID-5ead-13an-2kcs
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2711.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2711.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2711
reference_id
reference_type
scores
0
value 0.00519
scoring_system epss
scoring_elements 0.66829
published_at 2026-04-16T12:55:00Z
1
value 0.00519
scoring_system epss
scoring_elements 0.66723
published_at 2026-04-01T12:55:00Z
2
value 0.00519
scoring_system epss
scoring_elements 0.66761
published_at 2026-04-02T12:55:00Z
3
value 0.00519
scoring_system epss
scoring_elements 0.66787
published_at 2026-04-04T12:55:00Z
4
value 0.00519
scoring_system epss
scoring_elements 0.66758
published_at 2026-04-07T12:55:00Z
5
value 0.00519
scoring_system epss
scoring_elements 0.66807
published_at 2026-04-08T12:55:00Z
6
value 0.00519
scoring_system epss
scoring_elements 0.66822
published_at 2026-04-09T12:55:00Z
7
value 0.00519
scoring_system epss
scoring_elements 0.66842
published_at 2026-04-11T12:55:00Z
8
value 0.00519
scoring_system epss
scoring_elements 0.66828
published_at 2026-04-12T12:55:00Z
9
value 0.00519
scoring_system epss
scoring_elements 0.66796
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2711
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220603
reference_id 1220603
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220603
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2711
reference_id CVE-2015-2711
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2711
4
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-49
reference_id mfsa2015-49
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-49
6
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2711
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ead-13an-2kcs
5
url VCID-6kac-5ery-wuew
vulnerability_id VCID-6kac-5ery-wuew
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4473.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4473.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4473
reference_id
reference_type
scores
0
value 0.03655
scoring_system epss
scoring_elements 0.87819
published_at 2026-04-01T12:55:00Z
1
value 0.04054
scoring_system epss
scoring_elements 0.88535
published_at 2026-04-16T12:55:00Z
2
value 0.04054
scoring_system epss
scoring_elements 0.88529
published_at 2026-04-11T12:55:00Z
3
value 0.04054
scoring_system epss
scoring_elements 0.88521
published_at 2026-04-13T12:55:00Z
4
value 0.04054
scoring_system epss
scoring_elements 0.88474
published_at 2026-04-02T12:55:00Z
5
value 0.04054
scoring_system epss
scoring_elements 0.88491
published_at 2026-04-04T12:55:00Z
6
value 0.04054
scoring_system epss
scoring_elements 0.88495
published_at 2026-04-07T12:55:00Z
7
value 0.04054
scoring_system epss
scoring_elements 0.88513
published_at 2026-04-08T12:55:00Z
8
value 0.04054
scoring_system epss
scoring_elements 0.88518
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4473
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
24
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252271
reference_id 1252271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252271
26
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
27
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-79
reference_id mfsa2015-79
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-79
28
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
29
reference_url https://access.redhat.com/errata/RHSA-2015:1682
reference_id RHSA-2015:1682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1682
30
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
31
reference_url https://usn.ubuntu.com/2712-1/
reference_id USN-2712-1
reference_type
scores
url https://usn.ubuntu.com/2712-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4473
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6kac-5ery-wuew
6
url VCID-7gzd-vyba-bfbs
vulnerability_id VCID-7gzd-vyba-bfbs
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0799.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0799
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29104
published_at 2026-04-16T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.29125
published_at 2026-04-01T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.292
published_at 2026-04-02T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29252
published_at 2026-04-04T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.29063
published_at 2026-04-07T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29126
published_at 2026-04-08T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29168
published_at 2026-04-09T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29173
published_at 2026-04-11T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29127
published_at 2026-04-12T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29075
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0799
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1208731
reference_id 1208731
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1208731
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799
reference_id CVE-2015-0799
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-44
reference_id mfsa2015-44
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-44
6
reference_url https://usn.ubuntu.com/2557-1/
reference_id USN-2557-1
reference_type
scores
url https://usn.ubuntu.com/2557-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0799
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7gzd-vyba-bfbs
7
url VCID-82k6-qk5e-cuag
vulnerability_id VCID-82k6-qk5e-cuag
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2729
reference_id
reference_type
scores
0
value 0.00413
scoring_system epss
scoring_elements 0.61569
published_at 2026-04-16T12:55:00Z
1
value 0.00413
scoring_system epss
scoring_elements 0.61402
published_at 2026-04-01T12:55:00Z
2
value 0.00413
scoring_system epss
scoring_elements 0.61478
published_at 2026-04-02T12:55:00Z
3
value 0.00413
scoring_system epss
scoring_elements 0.61507
published_at 2026-04-04T12:55:00Z
4
value 0.00413
scoring_system epss
scoring_elements 0.61477
published_at 2026-04-07T12:55:00Z
5
value 0.00413
scoring_system epss
scoring_elements 0.61524
published_at 2026-04-08T12:55:00Z
6
value 0.00413
scoring_system epss
scoring_elements 0.61539
published_at 2026-04-09T12:55:00Z
7
value 0.00413
scoring_system epss
scoring_elements 0.61561
published_at 2026-04-11T12:55:00Z
8
value 0.00413
scoring_system epss
scoring_elements 0.61548
published_at 2026-04-12T12:55:00Z
9
value 0.00413
scoring_system epss
scoring_elements 0.61527
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2729
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236952
reference_id 1236952
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236952
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729
reference_id CVE-2015-2729
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-62
reference_id mfsa2015-62
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-62
6
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
7
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
8
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2729
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-82k6-qk5e-cuag
8
url VCID-89pc-vcy3-tkd7
vulnerability_id VCID-89pc-vcy3-tkd7
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2718
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30757
published_at 2026-04-16T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30739
published_at 2026-04-01T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30865
published_at 2026-04-02T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30911
published_at 2026-04-04T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30731
published_at 2026-04-07T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30789
published_at 2026-04-08T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30821
published_at 2026-04-09T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30822
published_at 2026-04-11T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30778
published_at 2026-04-12T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30733
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2718
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220609
reference_id 1220609
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220609
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718
reference_id CVE-2015-2718
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718
4
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-56
reference_id mfsa2015-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-56
6
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2718
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-89pc-vcy3-tkd7
9
url VCID-9n5g-6m3r-3uez
vulnerability_id VCID-9n5g-6m3r-3uez
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0808.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0808
reference_id
reference_type
scores
0
value 0.00705
scoring_system epss
scoring_elements 0.72137
published_at 2026-04-16T12:55:00Z
1
value 0.00705
scoring_system epss
scoring_elements 0.72051
published_at 2026-04-01T12:55:00Z
2
value 0.00705
scoring_system epss
scoring_elements 0.72058
published_at 2026-04-02T12:55:00Z
3
value 0.00705
scoring_system epss
scoring_elements 0.72078
published_at 2026-04-04T12:55:00Z
4
value 0.00705
scoring_system epss
scoring_elements 0.72054
published_at 2026-04-07T12:55:00Z
5
value 0.00705
scoring_system epss
scoring_elements 0.72092
published_at 2026-04-08T12:55:00Z
6
value 0.00705
scoring_system epss
scoring_elements 0.72103
published_at 2026-04-09T12:55:00Z
7
value 0.00705
scoring_system epss
scoring_elements 0.72126
published_at 2026-04-11T12:55:00Z
8
value 0.00705
scoring_system epss
scoring_elements 0.72111
published_at 2026-04-12T12:55:00Z
9
value 0.00705
scoring_system epss
scoring_elements 0.72096
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0808
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207075
reference_id 1207075
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207075
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808
reference_id CVE-2015-0808
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-36
reference_id mfsa2015-36
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-36
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0808
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9n5g-6m3r-3uez
10
url VCID-drq5-6jps-skax
vulnerability_id VCID-drq5-6jps-skax
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4491
reference_id
reference_type
scores
0
value 0.04296
scoring_system epss
scoring_elements 0.88884
published_at 2026-04-16T12:55:00Z
1
value 0.04296
scoring_system epss
scoring_elements 0.88815
published_at 2026-04-01T12:55:00Z
2
value 0.04296
scoring_system epss
scoring_elements 0.88876
published_at 2026-04-11T12:55:00Z
3
value 0.04296
scoring_system epss
scoring_elements 0.88871
published_at 2026-04-13T12:55:00Z
4
value 0.04296
scoring_system epss
scoring_elements 0.88823
published_at 2026-04-02T12:55:00Z
5
value 0.04296
scoring_system epss
scoring_elements 0.88839
published_at 2026-04-04T12:55:00Z
6
value 0.04296
scoring_system epss
scoring_elements 0.88841
published_at 2026-04-07T12:55:00Z
7
value 0.04296
scoring_system epss
scoring_elements 0.88859
published_at 2026-04-08T12:55:00Z
8
value 0.04296
scoring_system epss
scoring_elements 0.88864
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4491
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252290
reference_id 1252290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252290
5
reference_url https://security.gentoo.org/glsa/201512-05
reference_id GLSA-201512-05
reference_type
scores
url https://security.gentoo.org/glsa/201512-05
6
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-88
reference_id mfsa2015-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-88
8
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
9
reference_url https://access.redhat.com/errata/RHSA-2015:1682
reference_id RHSA-2015:1682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1682
10
reference_url https://access.redhat.com/errata/RHSA-2015:1694
reference_id RHSA-2015:1694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1694
11
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
12
reference_url https://usn.ubuntu.com/2712-1/
reference_id USN-2712-1
reference_type
scores
url https://usn.ubuntu.com/2712-1/
13
reference_url https://usn.ubuntu.com/2722-1/
reference_id USN-2722-1
reference_type
scores
url https://usn.ubuntu.com/2722-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4491
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drq5-6jps-skax
11
url VCID-e193-1kgh-5kda
vulnerability_id VCID-e193-1kgh-5kda
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0805
reference_id
reference_type
scores
0
value 0.01674
scoring_system epss
scoring_elements 0.82181
published_at 2026-04-16T12:55:00Z
1
value 0.01674
scoring_system epss
scoring_elements 0.82076
published_at 2026-04-01T12:55:00Z
2
value 0.01674
scoring_system epss
scoring_elements 0.82088
published_at 2026-04-02T12:55:00Z
3
value 0.01674
scoring_system epss
scoring_elements 0.82109
published_at 2026-04-04T12:55:00Z
4
value 0.01674
scoring_system epss
scoring_elements 0.82105
published_at 2026-04-07T12:55:00Z
5
value 0.01674
scoring_system epss
scoring_elements 0.82132
published_at 2026-04-08T12:55:00Z
6
value 0.01674
scoring_system epss
scoring_elements 0.82139
published_at 2026-04-09T12:55:00Z
7
value 0.01674
scoring_system epss
scoring_elements 0.82158
published_at 2026-04-11T12:55:00Z
8
value 0.01674
scoring_system epss
scoring_elements 0.82149
published_at 2026-04-12T12:55:00Z
9
value 0.01674
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0805
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207078
reference_id 1207078
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207078
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805
reference_id CVE-2015-0805
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-38
reference_id mfsa2015-38
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-38
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0805
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e193-1kgh-5kda
12
url VCID-et32-whyj-dyev
vulnerability_id VCID-et32-whyj-dyev
summary Security researcher Joshua Drake reported potential integer overflows in the libstagefright library while processing video sample metadata in MPEG4 video files. This can lead to a potentially exploitable crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4496.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4496
reference_id
reference_type
scores
0
value 0.01513
scoring_system epss
scoring_elements 0.81249
published_at 2026-04-16T12:55:00Z
1
value 0.01513
scoring_system epss
scoring_elements 0.81149
published_at 2026-04-01T12:55:00Z
2
value 0.01513
scoring_system epss
scoring_elements 0.81158
published_at 2026-04-02T12:55:00Z
3
value 0.01513
scoring_system epss
scoring_elements 0.81182
published_at 2026-04-04T12:55:00Z
4
value 0.01513
scoring_system epss
scoring_elements 0.81181
published_at 2026-04-07T12:55:00Z
5
value 0.01513
scoring_system epss
scoring_elements 0.81208
published_at 2026-04-08T12:55:00Z
6
value 0.01513
scoring_system epss
scoring_elements 0.81214
published_at 2026-04-09T12:55:00Z
7
value 0.01513
scoring_system epss
scoring_elements 0.81234
published_at 2026-04-11T12:55:00Z
8
value 0.01513
scoring_system epss
scoring_elements 0.8122
published_at 2026-04-12T12:55:00Z
9
value 0.01513
scoring_system epss
scoring_elements 0.81213
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4496
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1253550
reference_id 1253550
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1253550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4496
reference_id CVE-2015-4496
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4496
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-93
reference_id mfsa2015-93
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-93
5
reference_url https://access.redhat.com/errata/RHSA-2015:0988
reference_id RHSA-2015:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0988
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4496
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-et32-whyj-dyev
13
url VCID-ffrc-3bx6-jbav
vulnerability_id VCID-ffrc-3bx6-jbav
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0801
reference_id
reference_type
scores
0
value 0.01191
scoring_system epss
scoring_elements 0.78872
published_at 2026-04-16T12:55:00Z
1
value 0.01191
scoring_system epss
scoring_elements 0.78795
published_at 2026-04-01T12:55:00Z
2
value 0.01191
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-02T12:55:00Z
3
value 0.01191
scoring_system epss
scoring_elements 0.78832
published_at 2026-04-04T12:55:00Z
4
value 0.01191
scoring_system epss
scoring_elements 0.78815
published_at 2026-04-07T12:55:00Z
5
value 0.01191
scoring_system epss
scoring_elements 0.7884
published_at 2026-04-08T12:55:00Z
6
value 0.01191
scoring_system epss
scoring_elements 0.78846
published_at 2026-04-09T12:55:00Z
7
value 0.01191
scoring_system epss
scoring_elements 0.7887
published_at 2026-04-11T12:55:00Z
8
value 0.01191
scoring_system epss
scoring_elements 0.78853
published_at 2026-04-12T12:55:00Z
9
value 0.01191
scoring_system epss
scoring_elements 0.78843
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0801
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207084
reference_id 1207084
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207084
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-40
reference_id mfsa2015-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-40
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0801
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ffrc-3bx6-jbav
14
url VCID-fnkt-es29-cuhh
vulnerability_id VCID-fnkt-es29-cuhh
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4498.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4498.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4498
reference_id
reference_type
scores
0
value 0.00576
scoring_system epss
scoring_elements 0.68833
published_at 2026-04-16T12:55:00Z
1
value 0.00576
scoring_system epss
scoring_elements 0.68725
published_at 2026-04-01T12:55:00Z
2
value 0.00576
scoring_system epss
scoring_elements 0.68744
published_at 2026-04-02T12:55:00Z
3
value 0.00576
scoring_system epss
scoring_elements 0.68764
published_at 2026-04-04T12:55:00Z
4
value 0.00576
scoring_system epss
scoring_elements 0.68743
published_at 2026-04-07T12:55:00Z
5
value 0.00576
scoring_system epss
scoring_elements 0.68794
published_at 2026-04-08T12:55:00Z
6
value 0.00576
scoring_system epss
scoring_elements 0.68813
published_at 2026-04-09T12:55:00Z
7
value 0.00576
scoring_system epss
scoring_elements 0.68836
published_at 2026-04-11T12:55:00Z
8
value 0.00576
scoring_system epss
scoring_elements 0.68821
published_at 2026-04-12T12:55:00Z
9
value 0.00576
scoring_system epss
scoring_elements 0.68792
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4498
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1257278
reference_id 1257278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1257278
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-95
reference_id mfsa2015-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-95
6
reference_url https://access.redhat.com/errata/RHSA-2015:1693
reference_id RHSA-2015:1693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1693
7
reference_url https://usn.ubuntu.com/2723-1/
reference_id USN-2723-1
reference_type
scores
url https://usn.ubuntu.com/2723-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4498
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fnkt-es29-cuhh
15
url VCID-ghtc-dh9g-2ufb
vulnerability_id VCID-ghtc-dh9g-2ufb
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2708
reference_id
reference_type
scores
0
value 0.01328
scoring_system epss
scoring_elements 0.79962
published_at 2026-04-16T12:55:00Z
1
value 0.01328
scoring_system epss
scoring_elements 0.79885
published_at 2026-04-01T12:55:00Z
2
value 0.01328
scoring_system epss
scoring_elements 0.79892
published_at 2026-04-02T12:55:00Z
3
value 0.01328
scoring_system epss
scoring_elements 0.79913
published_at 2026-04-04T12:55:00Z
4
value 0.01328
scoring_system epss
scoring_elements 0.79901
published_at 2026-04-07T12:55:00Z
5
value 0.01328
scoring_system epss
scoring_elements 0.79929
published_at 2026-04-08T12:55:00Z
6
value 0.01328
scoring_system epss
scoring_elements 0.79938
published_at 2026-04-09T12:55:00Z
7
value 0.01328
scoring_system epss
scoring_elements 0.79958
published_at 2026-04-11T12:55:00Z
8
value 0.01328
scoring_system epss
scoring_elements 0.79941
published_at 2026-04-12T12:55:00Z
9
value 0.01328
scoring_system epss
scoring_elements 0.79934
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2708
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220597
reference_id 1220597
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220597
9
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-46
reference_id mfsa2015-46
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-46
11
reference_url https://access.redhat.com/errata/RHSA-2015:0988
reference_id RHSA-2015:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0988
12
reference_url https://access.redhat.com/errata/RHSA-2015:1012
reference_id RHSA-2015:1012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1012
13
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
14
reference_url https://usn.ubuntu.com/2603-1/
reference_id USN-2603-1
reference_type
scores
url https://usn.ubuntu.com/2603-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2708
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ghtc-dh9g-2ufb
16
url VCID-gr7k-2v4p-kbfg
vulnerability_id VCID-gr7k-2v4p-kbfg
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0816
reference_id
reference_type
scores
0
value 0.8537
scoring_system epss
scoring_elements 0.99368
published_at 2026-04-16T12:55:00Z
1
value 0.8537
scoring_system epss
scoring_elements 0.99359
published_at 2026-04-02T12:55:00Z
2
value 0.8537
scoring_system epss
scoring_elements 0.99361
published_at 2026-04-04T12:55:00Z
3
value 0.8537
scoring_system epss
scoring_elements 0.99363
published_at 2026-04-08T12:55:00Z
4
value 0.8537
scoring_system epss
scoring_elements 0.99364
published_at 2026-04-09T12:55:00Z
5
value 0.8537
scoring_system epss
scoring_elements 0.99365
published_at 2026-04-11T12:55:00Z
6
value 0.8537
scoring_system epss
scoring_elements 0.99366
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207072
reference_id 1207072
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207072
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-33
reference_id mfsa2015-33
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-33
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0816
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gr7k-2v4p-kbfg
17
url VCID-grdt-g3kf-3uh3
vulnerability_id VCID-grdt-g3kf-3uh3
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0815
reference_id
reference_type
scores
0
value 0.01254
scoring_system epss
scoring_elements 0.79394
published_at 2026-04-16T12:55:00Z
1
value 0.01254
scoring_system epss
scoring_elements 0.79314
published_at 2026-04-01T12:55:00Z
2
value 0.01254
scoring_system epss
scoring_elements 0.79321
published_at 2026-04-02T12:55:00Z
3
value 0.01254
scoring_system epss
scoring_elements 0.79344
published_at 2026-04-04T12:55:00Z
4
value 0.01254
scoring_system epss
scoring_elements 0.7933
published_at 2026-04-07T12:55:00Z
5
value 0.01254
scoring_system epss
scoring_elements 0.79356
published_at 2026-04-08T12:55:00Z
6
value 0.01254
scoring_system epss
scoring_elements 0.79365
published_at 2026-04-09T12:55:00Z
7
value 0.01254
scoring_system epss
scoring_elements 0.79389
published_at 2026-04-11T12:55:00Z
8
value 0.01254
scoring_system epss
scoring_elements 0.79373
published_at 2026-04-12T12:55:00Z
9
value 0.01254
scoring_system epss
scoring_elements 0.79362
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0815
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207068
reference_id 1207068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207068
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-30
reference_id mfsa2015-30
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-30
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0815
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-grdt-g3kf-3uh3
18
url VCID-jmhk-12t1-kugh
vulnerability_id VCID-jmhk-12t1-kugh
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2730
reference_id
reference_type
scores
0
value 0.00228
scoring_system epss
scoring_elements 0.45581
published_at 2026-04-16T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.4544
published_at 2026-04-01T12:55:00Z
2
value 0.00228
scoring_system epss
scoring_elements 0.45514
published_at 2026-04-02T12:55:00Z
3
value 0.00228
scoring_system epss
scoring_elements 0.45536
published_at 2026-04-04T12:55:00Z
4
value 0.00228
scoring_system epss
scoring_elements 0.45482
published_at 2026-04-07T12:55:00Z
5
value 0.00228
scoring_system epss
scoring_elements 0.45537
published_at 2026-04-08T12:55:00Z
6
value 0.00228
scoring_system epss
scoring_elements 0.45538
published_at 2026-04-09T12:55:00Z
7
value 0.00228
scoring_system epss
scoring_elements 0.45558
published_at 2026-04-11T12:55:00Z
8
value 0.00228
scoring_system epss
scoring_elements 0.45527
published_at 2026-04-12T12:55:00Z
9
value 0.00228
scoring_system epss
scoring_elements 0.45533
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236954
reference_id 1236954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236954
5
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-64
reference_id mfsa2015-64
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-64
7
reference_url https://access.redhat.com/errata/RHSA-2015:1664
reference_id RHSA-2015:1664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1664
8
reference_url https://access.redhat.com/errata/RHSA-2015:1699
reference_id RHSA-2015:1699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1699
9
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
10
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
11
reference_url https://usn.ubuntu.com/2672-1/
reference_id USN-2672-1
reference_type
scores
url https://usn.ubuntu.com/2672-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2730
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jmhk-12t1-kugh
19
url VCID-jnj4-g593-37d7
vulnerability_id VCID-jnj4-g593-37d7
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0811
reference_id
reference_type
scores
0
value 0.00765
scoring_system epss
scoring_elements 0.73478
published_at 2026-04-16T12:55:00Z
1
value 0.00765
scoring_system epss
scoring_elements 0.73385
published_at 2026-04-01T12:55:00Z
2
value 0.00765
scoring_system epss
scoring_elements 0.73394
published_at 2026-04-02T12:55:00Z
3
value 0.00765
scoring_system epss
scoring_elements 0.73417
published_at 2026-04-04T12:55:00Z
4
value 0.00765
scoring_system epss
scoring_elements 0.73389
published_at 2026-04-07T12:55:00Z
5
value 0.00765
scoring_system epss
scoring_elements 0.73426
published_at 2026-04-08T12:55:00Z
6
value 0.00765
scoring_system epss
scoring_elements 0.7344
published_at 2026-04-09T12:55:00Z
7
value 0.00765
scoring_system epss
scoring_elements 0.73463
published_at 2026-04-11T12:55:00Z
8
value 0.00765
scoring_system epss
scoring_elements 0.73443
published_at 2026-04-12T12:55:00Z
9
value 0.00765
scoring_system epss
scoring_elements 0.73435
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0811
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207073
reference_id 1207073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207073
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811
reference_id CVE-2015-0811
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-34
reference_id mfsa2015-34
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-34
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0811
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jnj4-g593-37d7
20
url VCID-jqed-5g3b-auag
vulnerability_id VCID-jqed-5g3b-auag
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4478.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4478
reference_id
reference_type
scores
0
value 0.00661
scoring_system epss
scoring_elements 0.71175
published_at 2026-04-16T12:55:00Z
1
value 0.00661
scoring_system epss
scoring_elements 0.71081
published_at 2026-04-01T12:55:00Z
2
value 0.00661
scoring_system epss
scoring_elements 0.7109
published_at 2026-04-02T12:55:00Z
3
value 0.00661
scoring_system epss
scoring_elements 0.71107
published_at 2026-04-04T12:55:00Z
4
value 0.00661
scoring_system epss
scoring_elements 0.71082
published_at 2026-04-07T12:55:00Z
5
value 0.00661
scoring_system epss
scoring_elements 0.71124
published_at 2026-04-08T12:55:00Z
6
value 0.00661
scoring_system epss
scoring_elements 0.71137
published_at 2026-04-09T12:55:00Z
7
value 0.00661
scoring_system epss
scoring_elements 0.7116
published_at 2026-04-11T12:55:00Z
8
value 0.00661
scoring_system epss
scoring_elements 0.71145
published_at 2026-04-12T12:55:00Z
9
value 0.00661
scoring_system epss
scoring_elements 0.71129
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4478
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252282
reference_id 1252282
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252282
14
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-82
reference_id mfsa2015-82
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-82
16
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
17
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4478
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqed-5g3b-auag
21
url VCID-jqq7-zaqr-6bap
vulnerability_id VCID-jqq7-zaqr-6bap
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4481
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.37323
published_at 2026-04-16T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37246
published_at 2026-04-01T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.37412
published_at 2026-04-02T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.37436
published_at 2026-04-04T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.37264
published_at 2026-04-07T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.37315
published_at 2026-04-08T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.37327
published_at 2026-04-09T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.37339
published_at 2026-04-11T12:55:00Z
8
value 0.00164
scoring_system epss
scoring_elements 0.37305
published_at 2026-04-12T12:55:00Z
9
value 0.00164
scoring_system epss
scoring_elements 0.37277
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4481
1
reference_url https://code.google.com/p/google-security-research/issues/detail?id=427&can=1
reference_id CVE-2015-4481
reference_type exploit
scores
url https://code.google.com/p/google-security-research/issues/detail?id=427&can=1
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4481
reference_id CVE-2015-4481
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4481
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/37925.txt
reference_id CVE-2015-4481
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/37925.txt
4
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-84
reference_id mfsa2015-84
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-84
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4481
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqq7-zaqr-6bap
22
url VCID-jtxv-vhm6-33h3
vulnerability_id VCID-jtxv-vhm6-33h3
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2712.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2712.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2712
reference_id
reference_type
scores
0
value 0.03878
scoring_system epss
scoring_elements 0.88255
published_at 2026-04-16T12:55:00Z
1
value 0.03878
scoring_system epss
scoring_elements 0.88182
published_at 2026-04-01T12:55:00Z
2
value 0.03878
scoring_system epss
scoring_elements 0.8819
published_at 2026-04-02T12:55:00Z
3
value 0.03878
scoring_system epss
scoring_elements 0.88206
published_at 2026-04-04T12:55:00Z
4
value 0.03878
scoring_system epss
scoring_elements 0.88212
published_at 2026-04-07T12:55:00Z
5
value 0.03878
scoring_system epss
scoring_elements 0.88232
published_at 2026-04-08T12:55:00Z
6
value 0.03878
scoring_system epss
scoring_elements 0.88238
published_at 2026-04-09T12:55:00Z
7
value 0.03878
scoring_system epss
scoring_elements 0.88249
published_at 2026-04-11T12:55:00Z
8
value 0.03878
scoring_system epss
scoring_elements 0.88242
published_at 2026-04-12T12:55:00Z
9
value 0.03878
scoring_system epss
scoring_elements 0.88241
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2712
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220604
reference_id 1220604
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220604
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2712
reference_id CVE-2015-2712
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2712
4
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-50
reference_id mfsa2015-50
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-50
6
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2712
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jtxv-vhm6-33h3
23
url VCID-k6eg-55x2-dyh5
vulnerability_id VCID-k6eg-55x2-dyh5
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2731.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2731.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2731
reference_id
reference_type
scores
0
value 0.00945
scoring_system epss
scoring_elements 0.76347
published_at 2026-04-16T12:55:00Z
1
value 0.00945
scoring_system epss
scoring_elements 0.76247
published_at 2026-04-01T12:55:00Z
2
value 0.00945
scoring_system epss
scoring_elements 0.7625
published_at 2026-04-02T12:55:00Z
3
value 0.00945
scoring_system epss
scoring_elements 0.76281
published_at 2026-04-04T12:55:00Z
4
value 0.00945
scoring_system epss
scoring_elements 0.76261
published_at 2026-04-07T12:55:00Z
5
value 0.00945
scoring_system epss
scoring_elements 0.76293
published_at 2026-04-08T12:55:00Z
6
value 0.00945
scoring_system epss
scoring_elements 0.76307
published_at 2026-04-13T12:55:00Z
7
value 0.00945
scoring_system epss
scoring_elements 0.76334
published_at 2026-04-11T12:55:00Z
8
value 0.00945
scoring_system epss
scoring_elements 0.76312
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2731
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236953
reference_id 1236953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236953
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-63
reference_id mfsa2015-63
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-63
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2731
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6eg-55x2-dyh5
24
url VCID-kyhs-j9aj-vqft
vulnerability_id VCID-kyhs-j9aj-vqft
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2734
reference_id
reference_type
scores
0
value 0.01252
scoring_system epss
scoring_elements 0.7937
published_at 2026-04-16T12:55:00Z
1
value 0.01252
scoring_system epss
scoring_elements 0.79293
published_at 2026-04-01T12:55:00Z
2
value 0.01252
scoring_system epss
scoring_elements 0.793
published_at 2026-04-02T12:55:00Z
3
value 0.01252
scoring_system epss
scoring_elements 0.79324
published_at 2026-04-04T12:55:00Z
4
value 0.01252
scoring_system epss
scoring_elements 0.7931
published_at 2026-04-07T12:55:00Z
5
value 0.01252
scoring_system epss
scoring_elements 0.79335
published_at 2026-04-08T12:55:00Z
6
value 0.01252
scoring_system epss
scoring_elements 0.79345
published_at 2026-04-09T12:55:00Z
7
value 0.01252
scoring_system epss
scoring_elements 0.79369
published_at 2026-04-11T12:55:00Z
8
value 0.01252
scoring_system epss
scoring_elements 0.79353
published_at 2026-04-12T12:55:00Z
9
value 0.01252
scoring_system epss
scoring_elements 0.79343
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2734
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
reference_id 1236956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
reference_id mfsa2015-66
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
22
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2734
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kyhs-j9aj-vqft
25
url VCID-mwyu-5rk2-xbbz
vulnerability_id VCID-mwyu-5rk2-xbbz
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2721
reference_id
reference_type
scores
0
value 0.00607
scoring_system epss
scoring_elements 0.69717
published_at 2026-04-16T12:55:00Z
1
value 0.00607
scoring_system epss
scoring_elements 0.69606
published_at 2026-04-01T12:55:00Z
2
value 0.00607
scoring_system epss
scoring_elements 0.69619
published_at 2026-04-02T12:55:00Z
3
value 0.00607
scoring_system epss
scoring_elements 0.69635
published_at 2026-04-04T12:55:00Z
4
value 0.00607
scoring_system epss
scoring_elements 0.69614
published_at 2026-04-07T12:55:00Z
5
value 0.00607
scoring_system epss
scoring_elements 0.69665
published_at 2026-04-08T12:55:00Z
6
value 0.00607
scoring_system epss
scoring_elements 0.69682
published_at 2026-04-09T12:55:00Z
7
value 0.00607
scoring_system epss
scoring_elements 0.69704
published_at 2026-04-11T12:55:00Z
8
value 0.00607
scoring_system epss
scoring_elements 0.69689
published_at 2026-04-12T12:55:00Z
9
value 0.00607
scoring_system epss
scoring_elements 0.69676
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236967
reference_id 1236967
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236967
17
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
18
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
19
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-71
reference_id mfsa2015-71
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-71
21
reference_url https://access.redhat.com/errata/RHSA-2015:1185
reference_id RHSA-2015:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1185
22
reference_url https://access.redhat.com/errata/RHSA-2015:1664
reference_id RHSA-2015:1664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1664
23
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
24
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
25
reference_url https://usn.ubuntu.com/2672-1/
reference_id USN-2672-1
reference_type
scores
url https://usn.ubuntu.com/2672-1/
26
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2721
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwyu-5rk2-xbbz
26
url VCID-nav6-hsaf-2fbj
vulnerability_id VCID-nav6-hsaf-2fbj
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2715
reference_id
reference_type
scores
0
value 0.01381
scoring_system epss
scoring_elements 0.80306
published_at 2026-04-16T12:55:00Z
1
value 0.01381
scoring_system epss
scoring_elements 0.80224
published_at 2026-04-01T12:55:00Z
2
value 0.01381
scoring_system epss
scoring_elements 0.80232
published_at 2026-04-02T12:55:00Z
3
value 0.01381
scoring_system epss
scoring_elements 0.80252
published_at 2026-04-04T12:55:00Z
4
value 0.01381
scoring_system epss
scoring_elements 0.8024
published_at 2026-04-07T12:55:00Z
5
value 0.01381
scoring_system epss
scoring_elements 0.80268
published_at 2026-04-08T12:55:00Z
6
value 0.01381
scoring_system epss
scoring_elements 0.80278
published_at 2026-04-09T12:55:00Z
7
value 0.01381
scoring_system epss
scoring_elements 0.80297
published_at 2026-04-11T12:55:00Z
8
value 0.01381
scoring_system epss
scoring_elements 0.80282
published_at 2026-04-12T12:55:00Z
9
value 0.01381
scoring_system epss
scoring_elements 0.80275
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2715
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220606
reference_id 1220606
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220606
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715
reference_id CVE-2015-2715
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715
4
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-53
reference_id mfsa2015-53
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-53
6
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2715
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nav6-hsaf-2fbj
27
url VCID-nega-51gt-hqfd
vulnerability_id VCID-nega-51gt-hqfd
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4482
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25703
published_at 2026-04-16T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25797
published_at 2026-04-01T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25857
published_at 2026-04-02T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.259
published_at 2026-04-04T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25671
published_at 2026-04-07T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25742
published_at 2026-04-08T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.2579
published_at 2026-04-09T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.258
published_at 2026-04-11T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25759
published_at 2026-04-12T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.257
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4482
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4482
reference_id CVE-2015-4482
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4482
2
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-85
reference_id mfsa2015-85
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-85
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4482
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nega-51gt-hqfd
28
url VCID-p7k1-93e6-cfha
vulnerability_id VCID-p7k1-93e6-cfha
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0803.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0803.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0803
reference_id
reference_type
scores
0
value 0.01674
scoring_system epss
scoring_elements 0.82181
published_at 2026-04-16T12:55:00Z
1
value 0.01674
scoring_system epss
scoring_elements 0.82076
published_at 2026-04-01T12:55:00Z
2
value 0.01674
scoring_system epss
scoring_elements 0.82088
published_at 2026-04-02T12:55:00Z
3
value 0.01674
scoring_system epss
scoring_elements 0.82109
published_at 2026-04-04T12:55:00Z
4
value 0.01674
scoring_system epss
scoring_elements 0.82105
published_at 2026-04-07T12:55:00Z
5
value 0.01674
scoring_system epss
scoring_elements 0.82132
published_at 2026-04-08T12:55:00Z
6
value 0.01674
scoring_system epss
scoring_elements 0.82139
published_at 2026-04-09T12:55:00Z
7
value 0.01674
scoring_system epss
scoring_elements 0.82158
published_at 2026-04-11T12:55:00Z
8
value 0.01674
scoring_system epss
scoring_elements 0.82149
published_at 2026-04-12T12:55:00Z
9
value 0.01674
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0803
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207081
reference_id 1207081
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207081
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803
reference_id CVE-2015-0803
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-39
reference_id mfsa2015-39
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-39
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0803
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p7k1-93e6-cfha
29
url VCID-pcxu-acuh-m3be
vulnerability_id VCID-pcxu-acuh-m3be
summary
A buffer overflow in GStreamer could allow remote attackers to
    execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0797.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0797.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0797
reference_id
reference_type
scores
0
value 0.07609
scoring_system epss
scoring_elements 0.91877
published_at 2026-04-16T12:55:00Z
1
value 0.07609
scoring_system epss
scoring_elements 0.91816
published_at 2026-04-01T12:55:00Z
2
value 0.07609
scoring_system epss
scoring_elements 0.91825
published_at 2026-04-02T12:55:00Z
3
value 0.07609
scoring_system epss
scoring_elements 0.91831
published_at 2026-04-04T12:55:00Z
4
value 0.07609
scoring_system epss
scoring_elements 0.91839
published_at 2026-04-07T12:55:00Z
5
value 0.07609
scoring_system epss
scoring_elements 0.91852
published_at 2026-04-08T12:55:00Z
6
value 0.07609
scoring_system epss
scoring_elements 0.91858
published_at 2026-04-13T12:55:00Z
7
value 0.07609
scoring_system epss
scoring_elements 0.91861
published_at 2026-04-11T12:55:00Z
8
value 0.07609
scoring_system epss
scoring_elements 0.91862
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0797
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220600
reference_id 1220600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220600
9
reference_url https://security.gentoo.org/glsa/201512-07
reference_id GLSA-201512-07
reference_type
scores
url https://security.gentoo.org/glsa/201512-07
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-47
reference_id mfsa2015-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-47
11
reference_url https://access.redhat.com/errata/RHSA-2015:0988
reference_id RHSA-2015:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0988
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0797
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pcxu-acuh-m3be
30
url VCID-qj59-9xmk-7yg9
vulnerability_id VCID-qj59-9xmk-7yg9
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2722
reference_id
reference_type
scores
0
value 0.02313
scoring_system epss
scoring_elements 0.84796
published_at 2026-04-16T12:55:00Z
1
value 0.02313
scoring_system epss
scoring_elements 0.84701
published_at 2026-04-01T12:55:00Z
2
value 0.02313
scoring_system epss
scoring_elements 0.84716
published_at 2026-04-02T12:55:00Z
3
value 0.02313
scoring_system epss
scoring_elements 0.84736
published_at 2026-04-04T12:55:00Z
4
value 0.02313
scoring_system epss
scoring_elements 0.84738
published_at 2026-04-07T12:55:00Z
5
value 0.02313
scoring_system epss
scoring_elements 0.8476
published_at 2026-04-08T12:55:00Z
6
value 0.02313
scoring_system epss
scoring_elements 0.84767
published_at 2026-04-09T12:55:00Z
7
value 0.02313
scoring_system epss
scoring_elements 0.84785
published_at 2026-04-11T12:55:00Z
8
value 0.02313
scoring_system epss
scoring_elements 0.8478
published_at 2026-04-12T12:55:00Z
9
value 0.02313
scoring_system epss
scoring_elements 0.84774
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2722
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236955
reference_id 1236955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236955
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722
reference_id CVE-2015-2722
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-65
reference_id mfsa2015-65
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-65
6
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
7
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
8
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2722
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qj59-9xmk-7yg9
31
url VCID-qny5-vvv5-q7f4
vulnerability_id VCID-qny5-vvv5-q7f4
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2706.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2706.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2706
reference_id
reference_type
scores
0
value 0.01133
scoring_system epss
scoring_elements 0.78373
published_at 2026-04-16T12:55:00Z
1
value 0.01133
scoring_system epss
scoring_elements 0.7829
published_at 2026-04-01T12:55:00Z
2
value 0.01133
scoring_system epss
scoring_elements 0.78296
published_at 2026-04-02T12:55:00Z
3
value 0.01133
scoring_system epss
scoring_elements 0.78327
published_at 2026-04-04T12:55:00Z
4
value 0.01133
scoring_system epss
scoring_elements 0.78309
published_at 2026-04-07T12:55:00Z
5
value 0.01133
scoring_system epss
scoring_elements 0.78335
published_at 2026-04-08T12:55:00Z
6
value 0.01133
scoring_system epss
scoring_elements 0.78341
published_at 2026-04-09T12:55:00Z
7
value 0.01133
scoring_system epss
scoring_elements 0.78368
published_at 2026-04-11T12:55:00Z
8
value 0.01133
scoring_system epss
scoring_elements 0.78351
published_at 2026-04-12T12:55:00Z
9
value 0.01133
scoring_system epss
scoring_elements 0.78344
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2706
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1213935
reference_id 1213935
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1213935
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706
reference_id CVE-2015-2706
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-45
reference_id mfsa2015-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-45
6
reference_url https://usn.ubuntu.com/2571-1/
reference_id USN-2571-1
reference_type
scores
url https://usn.ubuntu.com/2571-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2706
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qny5-vvv5-q7f4
32
url VCID-qynw-zxy1-qqfh
vulnerability_id VCID-qynw-zxy1-qqfh
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3079
reference_id
reference_type
scores
0
value 0.00437
scoring_system epss
scoring_elements 0.63053
published_at 2026-04-13T12:55:00Z
1
value 0.00437
scoring_system epss
scoring_elements 0.62953
published_at 2026-04-01T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.63089
published_at 2026-04-16T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63075
published_at 2026-04-12T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63011
published_at 2026-04-02T12:55:00Z
5
value 0.00437
scoring_system epss
scoring_elements 0.63041
published_at 2026-04-04T12:55:00Z
6
value 0.00437
scoring_system epss
scoring_elements 0.63005
published_at 2026-04-07T12:55:00Z
7
value 0.00437
scoring_system epss
scoring_elements 0.63056
published_at 2026-04-08T12:55:00Z
8
value 0.00437
scoring_system epss
scoring_elements 0.63072
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3079
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-57
reference_id mfsa2015-57
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-57
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2011-3079
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qynw-zxy1-qqfh
33
url VCID-r7v8-qp3e-cua2
vulnerability_id VCID-r7v8-qp3e-cua2
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2717
reference_id
reference_type
scores
0
value 0.02421
scoring_system epss
scoring_elements 0.85151
published_at 2026-04-16T12:55:00Z
1
value 0.02421
scoring_system epss
scoring_elements 0.85058
published_at 2026-04-01T12:55:00Z
2
value 0.02421
scoring_system epss
scoring_elements 0.85071
published_at 2026-04-02T12:55:00Z
3
value 0.02421
scoring_system epss
scoring_elements 0.85088
published_at 2026-04-04T12:55:00Z
4
value 0.02421
scoring_system epss
scoring_elements 0.85093
published_at 2026-04-07T12:55:00Z
5
value 0.02421
scoring_system epss
scoring_elements 0.85114
published_at 2026-04-08T12:55:00Z
6
value 0.02421
scoring_system epss
scoring_elements 0.85121
published_at 2026-04-09T12:55:00Z
7
value 0.02421
scoring_system epss
scoring_elements 0.85136
published_at 2026-04-11T12:55:00Z
8
value 0.02421
scoring_system epss
scoring_elements 0.85133
published_at 2026-04-12T12:55:00Z
9
value 0.02421
scoring_system epss
scoring_elements 0.8513
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2717
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220608
reference_id 1220608
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220608
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717
reference_id CVE-2015-2717
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717
4
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-55
reference_id mfsa2015-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-55
6
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2717
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r7v8-qp3e-cua2
34
url VCID-rzqy-gheq-cqgg
vulnerability_id VCID-rzqy-gheq-cqgg
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4000
reference_id
reference_type
scores
0
value 0.93743
scoring_system epss
scoring_elements 0.99851
published_at 2026-04-07T12:55:00Z
1
value 0.93894
scoring_system epss
scoring_elements 0.99875
published_at 2026-04-08T12:55:00Z
2
value 0.93894
scoring_system epss
scoring_elements 0.99876
published_at 2026-04-09T12:55:00Z
3
value 0.939
scoring_system epss
scoring_elements 0.99877
published_at 2026-04-16T12:55:00Z
4
value 0.939
scoring_system epss
scoring_elements 0.99873
published_at 2026-04-01T12:55:00Z
5
value 0.939
scoring_system epss
scoring_elements 0.99874
published_at 2026-04-02T12:55:00Z
6
value 0.939
scoring_system epss
scoring_elements 0.99875
published_at 2026-04-12T12:55:00Z
7
value 0.939
scoring_system epss
scoring_elements 0.99876
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
47
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1223211
reference_id 1223211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1223211
49
reference_url https://security.gentoo.org/glsa/201506-02
reference_id GLSA-201506-02
reference_type
scores
url https://security.gentoo.org/glsa/201506-02
50
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
51
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
52
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
53
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-70
reference_id mfsa2015-70
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-70
55
reference_url https://access.redhat.com/errata/RHSA-2015:1072
reference_id RHSA-2015:1072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1072
56
reference_url https://access.redhat.com/errata/RHSA-2015:1185
reference_id RHSA-2015:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1185
57
reference_url https://access.redhat.com/errata/RHSA-2015:1197
reference_id RHSA-2015:1197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1197
58
reference_url https://access.redhat.com/errata/RHSA-2015:1228
reference_id RHSA-2015:1228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1228
59
reference_url https://access.redhat.com/errata/RHSA-2015:1229
reference_id RHSA-2015:1229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1229
60
reference_url https://access.redhat.com/errata/RHSA-2015:1230
reference_id RHSA-2015:1230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1230
61
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
62
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
63
reference_url https://access.redhat.com/errata/RHSA-2015:1243
reference_id RHSA-2015:1243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1243
64
reference_url https://access.redhat.com/errata/RHSA-2015:1485
reference_id RHSA-2015:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1485
65
reference_url https://access.redhat.com/errata/RHSA-2015:1486
reference_id RHSA-2015:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1486
66
reference_url https://access.redhat.com/errata/RHSA-2015:1488
reference_id RHSA-2015:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1488
67
reference_url https://access.redhat.com/errata/RHSA-2015:1526
reference_id RHSA-2015:1526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1526
68
reference_url https://access.redhat.com/errata/RHSA-2015:1544
reference_id RHSA-2015:1544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1544
69
reference_url https://access.redhat.com/errata/RHSA-2015:1604
reference_id RHSA-2015:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1604
70
reference_url https://access.redhat.com/errata/RHSA-2016:2056
reference_id RHSA-2016:2056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2056
71
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
72
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
73
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
74
reference_url https://usn.ubuntu.com/2696-1/
reference_id USN-2696-1
reference_type
scores
url https://usn.ubuntu.com/2696-1/
75
reference_url https://usn.ubuntu.com/2706-1/
reference_id USN-2706-1
reference_type
scores
url https://usn.ubuntu.com/2706-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4000
risk_score 7.2
exploitability 2.0
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqy-gheq-cqgg
35
url VCID-s76d-pjvk-63cr
vulnerability_id VCID-s76d-pjvk-63cr
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4485.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4485.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4485
reference_id
reference_type
scores
0
value 0.07599
scoring_system epss
scoring_elements 0.91871
published_at 2026-04-16T12:55:00Z
1
value 0.07599
scoring_system epss
scoring_elements 0.9181
published_at 2026-04-01T12:55:00Z
2
value 0.07599
scoring_system epss
scoring_elements 0.91818
published_at 2026-04-02T12:55:00Z
3
value 0.07599
scoring_system epss
scoring_elements 0.91824
published_at 2026-04-04T12:55:00Z
4
value 0.07599
scoring_system epss
scoring_elements 0.91832
published_at 2026-04-07T12:55:00Z
5
value 0.07599
scoring_system epss
scoring_elements 0.91845
published_at 2026-04-08T12:55:00Z
6
value 0.07599
scoring_system epss
scoring_elements 0.91851
published_at 2026-04-09T12:55:00Z
7
value 0.07599
scoring_system epss
scoring_elements 0.91855
published_at 2026-04-11T12:55:00Z
8
value 0.07599
scoring_system epss
scoring_elements 0.91856
published_at 2026-04-12T12:55:00Z
9
value 0.07599
scoring_system epss
scoring_elements 0.91852
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4485
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252292
reference_id 1252292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252292
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485
reference_id CVE-2015-4485
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485
4
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-89
reference_id mfsa2015-89
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-89
6
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
7
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4485
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s76d-pjvk-63cr
36
url VCID-teza-m5kj-s7ac
vulnerability_id VCID-teza-m5kj-s7ac
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4492.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4492
reference_id
reference_type
scores
0
value 0.02306
scoring_system epss
scoring_elements 0.84773
published_at 2026-04-16T12:55:00Z
1
value 0.02306
scoring_system epss
scoring_elements 0.84677
published_at 2026-04-01T12:55:00Z
2
value 0.02306
scoring_system epss
scoring_elements 0.84692
published_at 2026-04-02T12:55:00Z
3
value 0.02306
scoring_system epss
scoring_elements 0.84712
published_at 2026-04-04T12:55:00Z
4
value 0.02306
scoring_system epss
scoring_elements 0.84714
published_at 2026-04-07T12:55:00Z
5
value 0.02306
scoring_system epss
scoring_elements 0.84736
published_at 2026-04-08T12:55:00Z
6
value 0.02306
scoring_system epss
scoring_elements 0.84743
published_at 2026-04-09T12:55:00Z
7
value 0.02306
scoring_system epss
scoring_elements 0.84761
published_at 2026-04-11T12:55:00Z
8
value 0.02306
scoring_system epss
scoring_elements 0.84757
published_at 2026-04-12T12:55:00Z
9
value 0.02306
scoring_system epss
scoring_elements 0.84751
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252295
reference_id 1252295
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252295
14
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-92
reference_id mfsa2015-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-92
16
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
17
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4492
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-teza-m5kj-s7ac
37
url VCID-tsmv-w2tb-hyht
vulnerability_id VCID-tsmv-w2tb-hyht
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4487
reference_id
reference_type
scores
0
value 0.02676
scoring_system epss
scoring_elements 0.85847
published_at 2026-04-16T12:55:00Z
1
value 0.02676
scoring_system epss
scoring_elements 0.85754
published_at 2026-04-01T12:55:00Z
2
value 0.02676
scoring_system epss
scoring_elements 0.85767
published_at 2026-04-02T12:55:00Z
3
value 0.02676
scoring_system epss
scoring_elements 0.85785
published_at 2026-04-04T12:55:00Z
4
value 0.02676
scoring_system epss
scoring_elements 0.85791
published_at 2026-04-07T12:55:00Z
5
value 0.02676
scoring_system epss
scoring_elements 0.8581
published_at 2026-04-08T12:55:00Z
6
value 0.02676
scoring_system epss
scoring_elements 0.8582
published_at 2026-04-09T12:55:00Z
7
value 0.02676
scoring_system epss
scoring_elements 0.85835
published_at 2026-04-11T12:55:00Z
8
value 0.02676
scoring_system epss
scoring_elements 0.85832
published_at 2026-04-12T12:55:00Z
9
value 0.02676
scoring_system epss
scoring_elements 0.85828
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4487
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252293
reference_id 1252293
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252293
25
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-90
reference_id mfsa2015-90
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-90
27
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
28
reference_url https://access.redhat.com/errata/RHSA-2015:1682
reference_id RHSA-2015:1682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1682
29
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
30
reference_url https://usn.ubuntu.com/2712-1/
reference_id USN-2712-1
reference_type
scores
url https://usn.ubuntu.com/2712-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4487
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsmv-w2tb-hyht
38
url VCID-ua69-cwm3-8ubh
vulnerability_id VCID-ua69-cwm3-8ubh
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2741.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2741.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2741
reference_id
reference_type
scores
0
value 0.00426
scoring_system epss
scoring_elements 0.62303
published_at 2026-04-16T12:55:00Z
1
value 0.00426
scoring_system epss
scoring_elements 0.62147
published_at 2026-04-01T12:55:00Z
2
value 0.00426
scoring_system epss
scoring_elements 0.62207
published_at 2026-04-02T12:55:00Z
3
value 0.00426
scoring_system epss
scoring_elements 0.62237
published_at 2026-04-04T12:55:00Z
4
value 0.00426
scoring_system epss
scoring_elements 0.62204
published_at 2026-04-07T12:55:00Z
5
value 0.00426
scoring_system epss
scoring_elements 0.62254
published_at 2026-04-08T12:55:00Z
6
value 0.00426
scoring_system epss
scoring_elements 0.62271
published_at 2026-04-09T12:55:00Z
7
value 0.00426
scoring_system epss
scoring_elements 0.62289
published_at 2026-04-11T12:55:00Z
8
value 0.00426
scoring_system epss
scoring_elements 0.62279
published_at 2026-04-12T12:55:00Z
9
value 0.00426
scoring_system epss
scoring_elements 0.62257
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2741
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236963
reference_id 1236963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236963
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741
reference_id CVE-2015-2741
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-67
reference_id mfsa2015-67
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-67
6
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
7
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
8
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
9
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2741
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ua69-cwm3-8ubh
39
url VCID-ueke-9crt-qybh
vulnerability_id VCID-ueke-9crt-qybh
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4475.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4475.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4475
reference_id
reference_type
scores
0
value 0.01248
scoring_system epss
scoring_elements 0.79308
published_at 2026-04-13T12:55:00Z
1
value 0.01248
scoring_system epss
scoring_elements 0.7926
published_at 2026-04-01T12:55:00Z
2
value 0.01248
scoring_system epss
scoring_elements 0.79267
published_at 2026-04-02T12:55:00Z
3
value 0.01248
scoring_system epss
scoring_elements 0.79291
published_at 2026-04-04T12:55:00Z
4
value 0.01248
scoring_system epss
scoring_elements 0.79277
published_at 2026-04-07T12:55:00Z
5
value 0.01248
scoring_system epss
scoring_elements 0.79302
published_at 2026-04-08T12:55:00Z
6
value 0.01248
scoring_system epss
scoring_elements 0.79312
published_at 2026-04-09T12:55:00Z
7
value 0.01248
scoring_system epss
scoring_elements 0.79335
published_at 2026-04-16T12:55:00Z
8
value 0.01248
scoring_system epss
scoring_elements 0.79319
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4475
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252276
reference_id 1252276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252276
14
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-80
reference_id mfsa2015-80
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-80
16
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
17
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4475
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ueke-9crt-qybh
40
url VCID-uzga-bp6y-27fy
vulnerability_id VCID-uzga-bp6y-27fy
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4497.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4497.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4497
reference_id
reference_type
scores
0
value 0.0304
scoring_system epss
scoring_elements 0.86688
published_at 2026-04-16T12:55:00Z
1
value 0.0304
scoring_system epss
scoring_elements 0.86613
published_at 2026-04-01T12:55:00Z
2
value 0.0304
scoring_system epss
scoring_elements 0.86624
published_at 2026-04-02T12:55:00Z
3
value 0.0304
scoring_system epss
scoring_elements 0.86644
published_at 2026-04-04T12:55:00Z
4
value 0.0304
scoring_system epss
scoring_elements 0.86642
published_at 2026-04-07T12:55:00Z
5
value 0.0304
scoring_system epss
scoring_elements 0.86661
published_at 2026-04-08T12:55:00Z
6
value 0.0304
scoring_system epss
scoring_elements 0.86671
published_at 2026-04-09T12:55:00Z
7
value 0.0304
scoring_system epss
scoring_elements 0.86684
published_at 2026-04-11T12:55:00Z
8
value 0.0304
scoring_system epss
scoring_elements 0.86682
published_at 2026-04-12T12:55:00Z
9
value 0.0304
scoring_system epss
scoring_elements 0.86675
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4497
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1257276
reference_id 1257276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1257276
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-94
reference_id mfsa2015-94
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-94
6
reference_url https://access.redhat.com/errata/RHSA-2015:1693
reference_id RHSA-2015:1693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1693
7
reference_url https://usn.ubuntu.com/2723-1/
reference_id USN-2723-1
reference_type
scores
url https://usn.ubuntu.com/2723-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4497
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uzga-bp6y-27fy
41
url VCID-v3rg-mrwe-yqck
vulnerability_id VCID-v3rg-mrwe-yqck
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4484.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4484.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4484
reference_id
reference_type
scores
0
value 0.00848
scoring_system epss
scoring_elements 0.74882
published_at 2026-04-16T12:55:00Z
1
value 0.00848
scoring_system epss
scoring_elements 0.74802
published_at 2026-04-01T12:55:00Z
2
value 0.00848
scoring_system epss
scoring_elements 0.74804
published_at 2026-04-02T12:55:00Z
3
value 0.00848
scoring_system epss
scoring_elements 0.74832
published_at 2026-04-04T12:55:00Z
4
value 0.00848
scoring_system epss
scoring_elements 0.74806
published_at 2026-04-07T12:55:00Z
5
value 0.00848
scoring_system epss
scoring_elements 0.74839
published_at 2026-04-08T12:55:00Z
6
value 0.00848
scoring_system epss
scoring_elements 0.74853
published_at 2026-04-09T12:55:00Z
7
value 0.00848
scoring_system epss
scoring_elements 0.74876
published_at 2026-04-11T12:55:00Z
8
value 0.00848
scoring_system epss
scoring_elements 0.74855
published_at 2026-04-12T12:55:00Z
9
value 0.00848
scoring_system epss
scoring_elements 0.74846
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4484
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252289
reference_id 1252289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252289
14
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-87
reference_id mfsa2015-87
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-87
16
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
17
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4484
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v3rg-mrwe-yqck
42
url VCID-wh23-7b49-n3g5
vulnerability_id VCID-wh23-7b49-n3g5
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0813.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0813.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0813
reference_id
reference_type
scores
0
value 0.02842
scoring_system epss
scoring_elements 0.86223
published_at 2026-04-16T12:55:00Z
1
value 0.02842
scoring_system epss
scoring_elements 0.86142
published_at 2026-04-01T12:55:00Z
2
value 0.02842
scoring_system epss
scoring_elements 0.86152
published_at 2026-04-02T12:55:00Z
3
value 0.02842
scoring_system epss
scoring_elements 0.86168
published_at 2026-04-07T12:55:00Z
4
value 0.02842
scoring_system epss
scoring_elements 0.86187
published_at 2026-04-08T12:55:00Z
5
value 0.02842
scoring_system epss
scoring_elements 0.86199
published_at 2026-04-09T12:55:00Z
6
value 0.02842
scoring_system epss
scoring_elements 0.86213
published_at 2026-04-11T12:55:00Z
7
value 0.02842
scoring_system epss
scoring_elements 0.8621
published_at 2026-04-12T12:55:00Z
8
value 0.02842
scoring_system epss
scoring_elements 0.86206
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0813
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207088
reference_id 1207088
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207088
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-31
reference_id mfsa2015-31
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-31
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0813
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wh23-7b49-n3g5
43
url VCID-x2yk-hpvu-6fg6
vulnerability_id VCID-x2yk-hpvu-6fg6
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4479.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4479
reference_id
reference_type
scores
0
value 0.02255
scoring_system epss
scoring_elements 0.84617
published_at 2026-04-16T12:55:00Z
1
value 0.02255
scoring_system epss
scoring_elements 0.8452
published_at 2026-04-01T12:55:00Z
2
value 0.02255
scoring_system epss
scoring_elements 0.84535
published_at 2026-04-02T12:55:00Z
3
value 0.02255
scoring_system epss
scoring_elements 0.84556
published_at 2026-04-04T12:55:00Z
4
value 0.02255
scoring_system epss
scoring_elements 0.8456
published_at 2026-04-07T12:55:00Z
5
value 0.02255
scoring_system epss
scoring_elements 0.84581
published_at 2026-04-08T12:55:00Z
6
value 0.02255
scoring_system epss
scoring_elements 0.84588
published_at 2026-04-09T12:55:00Z
7
value 0.02255
scoring_system epss
scoring_elements 0.84607
published_at 2026-04-11T12:55:00Z
8
value 0.02255
scoring_system epss
scoring_elements 0.84602
published_at 2026-04-12T12:55:00Z
9
value 0.02255
scoring_system epss
scoring_elements 0.84598
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4479
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252285
reference_id 1252285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252285
14
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-83
reference_id mfsa2015-83
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-83
16
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
17
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-4479
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x2yk-hpvu-6fg6
44
url VCID-xjf8-mc7t-hfah
vulnerability_id VCID-xjf8-mc7t-hfah
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2724
reference_id
reference_type
scores
0
value 0.00912
scoring_system epss
scoring_elements 0.75893
published_at 2026-04-16T12:55:00Z
1
value 0.00912
scoring_system epss
scoring_elements 0.75798
published_at 2026-04-01T12:55:00Z
2
value 0.00912
scoring_system epss
scoring_elements 0.75802
published_at 2026-04-02T12:55:00Z
3
value 0.00912
scoring_system epss
scoring_elements 0.75835
published_at 2026-04-04T12:55:00Z
4
value 0.00912
scoring_system epss
scoring_elements 0.75813
published_at 2026-04-07T12:55:00Z
5
value 0.00912
scoring_system epss
scoring_elements 0.75845
published_at 2026-04-08T12:55:00Z
6
value 0.00912
scoring_system epss
scoring_elements 0.75857
published_at 2026-04-09T12:55:00Z
7
value 0.00912
scoring_system epss
scoring_elements 0.75881
published_at 2026-04-11T12:55:00Z
8
value 0.00912
scoring_system epss
scoring_elements 0.75862
published_at 2026-04-12T12:55:00Z
9
value 0.00912
scoring_system epss
scoring_elements 0.75855
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2724
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236947
reference_id 1236947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236947
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-59
reference_id mfsa2015-59
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-59
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
22
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2724
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xjf8-mc7t-hfah
45
url VCID-xqqq-rk53-ubhp
vulnerability_id VCID-xqqq-rk53-ubhp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0833
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16083
published_at 2026-04-16T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16216
published_at 2026-04-12T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16149
published_at 2026-04-13T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.1608
published_at 2026-04-01T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16264
published_at 2026-04-02T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16325
published_at 2026-04-04T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16123
published_at 2026-04-07T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16208
published_at 2026-04-08T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16275
published_at 2026-04-09T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16256
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0833
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833
reference_id CVE-2015-0833
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833
2
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-12
reference_id mfsa2015-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-12
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-58
reference_id mfsa2015-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-58
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.33.0
purl pkg:mozilla/SeaMonkey@2.33.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0
1
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0833
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqqq-rk53-ubhp
46
url VCID-xqxf-cnpj-3qas
vulnerability_id VCID-xqxf-cnpj-3qas
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2728
reference_id
reference_type
scores
0
value 0.01072
scoring_system epss
scoring_elements 0.77786
published_at 2026-04-16T12:55:00Z
1
value 0.01072
scoring_system epss
scoring_elements 0.7769
published_at 2026-04-01T12:55:00Z
2
value 0.01072
scoring_system epss
scoring_elements 0.77697
published_at 2026-04-02T12:55:00Z
3
value 0.01072
scoring_system epss
scoring_elements 0.77724
published_at 2026-04-04T12:55:00Z
4
value 0.01072
scoring_system epss
scoring_elements 0.77707
published_at 2026-04-07T12:55:00Z
5
value 0.01072
scoring_system epss
scoring_elements 0.77735
published_at 2026-04-08T12:55:00Z
6
value 0.01072
scoring_system epss
scoring_elements 0.7774
published_at 2026-04-09T12:55:00Z
7
value 0.01072
scoring_system epss
scoring_elements 0.77766
published_at 2026-04-11T12:55:00Z
8
value 0.01072
scoring_system epss
scoring_elements 0.77751
published_at 2026-04-12T12:55:00Z
9
value 0.01072
scoring_system epss
scoring_elements 0.7775
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2728
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236951
reference_id 1236951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236951
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-61
reference_id mfsa2015-61
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-61
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
20
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2728
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqxf-cnpj-3qas
47
url VCID-xx39-5rg1-b3am
vulnerability_id VCID-xx39-5rg1-b3am
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2710
reference_id
reference_type
scores
0
value 0.02421
scoring_system epss
scoring_elements 0.85151
published_at 2026-04-16T12:55:00Z
1
value 0.02421
scoring_system epss
scoring_elements 0.85058
published_at 2026-04-01T12:55:00Z
2
value 0.02421
scoring_system epss
scoring_elements 0.85071
published_at 2026-04-02T12:55:00Z
3
value 0.02421
scoring_system epss
scoring_elements 0.85088
published_at 2026-04-04T12:55:00Z
4
value 0.02421
scoring_system epss
scoring_elements 0.85092
published_at 2026-04-07T12:55:00Z
5
value 0.02421
scoring_system epss
scoring_elements 0.85114
published_at 2026-04-08T12:55:00Z
6
value 0.02421
scoring_system epss
scoring_elements 0.85121
published_at 2026-04-09T12:55:00Z
7
value 0.02421
scoring_system epss
scoring_elements 0.85135
published_at 2026-04-11T12:55:00Z
8
value 0.02421
scoring_system epss
scoring_elements 0.85133
published_at 2026-04-12T12:55:00Z
9
value 0.02421
scoring_system epss
scoring_elements 0.8513
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1220601
reference_id 1220601
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1220601
9
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-48
reference_id mfsa2015-48
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-48
11
reference_url https://access.redhat.com/errata/RHSA-2015:0988
reference_id RHSA-2015:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0988
12
reference_url https://access.redhat.com/errata/RHSA-2015:1012
reference_id RHSA-2015:1012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1012
13
reference_url https://usn.ubuntu.com/2602-1/
reference_id USN-2602-1
reference_type
scores
url https://usn.ubuntu.com/2602-1/
14
reference_url https://usn.ubuntu.com/2603-1/
reference_id USN-2603-1
reference_type
scores
url https://usn.ubuntu.com/2603-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-2710
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xx39-5rg1-b3am
48
url VCID-yq8w-7uvd-dyhk
vulnerability_id VCID-yq8w-7uvd-dyhk
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0810
reference_id
reference_type
scores
0
value 0.00396
scoring_system epss
scoring_elements 0.60486
published_at 2026-04-16T12:55:00Z
1
value 0.00396
scoring_system epss
scoring_elements 0.60323
published_at 2026-04-01T12:55:00Z
2
value 0.00396
scoring_system epss
scoring_elements 0.60398
published_at 2026-04-02T12:55:00Z
3
value 0.00396
scoring_system epss
scoring_elements 0.60426
published_at 2026-04-04T12:55:00Z
4
value 0.00396
scoring_system epss
scoring_elements 0.60393
published_at 2026-04-07T12:55:00Z
5
value 0.00396
scoring_system epss
scoring_elements 0.60442
published_at 2026-04-08T12:55:00Z
6
value 0.00396
scoring_system epss
scoring_elements 0.60459
published_at 2026-04-09T12:55:00Z
7
value 0.00396
scoring_system epss
scoring_elements 0.60479
published_at 2026-04-11T12:55:00Z
8
value 0.00396
scoring_system epss
scoring_elements 0.60465
published_at 2026-04-12T12:55:00Z
9
value 0.00396
scoring_system epss
scoring_elements 0.60445
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0810
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0810
reference_id CVE-2015-0810
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0810
2
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-35
reference_id mfsa2015-35
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-35
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0810
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yq8w-7uvd-dyhk
49
url VCID-ys1x-t7un-ayhr
vulnerability_id VCID-ys1x-t7un-ayhr
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0807
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33554
published_at 2026-04-16T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33485
published_at 2026-04-01T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33639
published_at 2026-04-02T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33673
published_at 2026-04-04T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33512
published_at 2026-04-07T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33556
published_at 2026-04-08T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.3359
published_at 2026-04-09T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33584
published_at 2026-04-11T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33543
published_at 2026-04-12T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33519
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0807
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207076
reference_id 1207076
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207076
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-37
reference_id mfsa2015-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-37
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.35.0
purl pkg:mozilla/SeaMonkey@2.35.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0
aliases CVE-2015-0807
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ys1x-t7un-ayhr
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0