| 0 |
| url |
VCID-2rn3-ydxb-5ugu |
| vulnerability_id |
VCID-2rn3-ydxb-5ugu |
| summary |
Multiple vulnerabilities have been found in Firefox, Thunderbird,
Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
the worst of which may allow remote execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4477 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0291 |
| scoring_system |
epss |
| scoring_elements |
0.86384 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0291 |
| scoring_system |
epss |
| scoring_elements |
0.86306 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0291 |
| scoring_system |
epss |
| scoring_elements |
0.86316 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0291 |
| scoring_system |
epss |
| scoring_elements |
0.86335 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0291 |
| scoring_system |
epss |
| scoring_elements |
0.86336 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0291 |
| scoring_system |
epss |
| scoring_elements |
0.86354 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0291 |
| scoring_system |
epss |
| scoring_elements |
0.86363 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0291 |
| scoring_system |
epss |
| scoring_elements |
0.86377 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0291 |
| scoring_system |
epss |
| scoring_elements |
0.86375 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0291 |
| scoring_system |
epss |
| scoring_elements |
0.86369 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0291 |
| scoring_system |
epss |
| scoring_elements |
0.86386 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0291 |
| scoring_system |
epss |
| scoring_elements |
0.86391 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4477 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4477
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2rn3-ydxb-5ugu |
|
| 1 |
| url |
VCID-2xup-1er1-xuh1 |
| vulnerability_id |
VCID-2xup-1er1-xuh1 |
| summary |
Security researcher David Chan reported that Mozilla's
mozTCPSocket implementation could leak data past the end of an array,
allowing for the potential exposure of memory or private data to malicious servers.
This feature is used by Firefox OS and is disabled by default in Firefox
on other operating systems. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4503 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00575 |
| scoring_system |
epss |
| scoring_elements |
0.68776 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00575 |
| scoring_system |
epss |
| scoring_elements |
0.68681 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00575 |
| scoring_system |
epss |
| scoring_elements |
0.68699 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00575 |
| scoring_system |
epss |
| scoring_elements |
0.68718 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00575 |
| scoring_system |
epss |
| scoring_elements |
0.68696 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00575 |
| scoring_system |
epss |
| scoring_elements |
0.68747 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00575 |
| scoring_system |
epss |
| scoring_elements |
0.68766 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00575 |
| scoring_system |
epss |
| scoring_elements |
0.68789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00575 |
| scoring_system |
epss |
| scoring_elements |
0.68774 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00575 |
| scoring_system |
epss |
| scoring_elements |
0.68745 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00575 |
| scoring_system |
epss |
| scoring_elements |
0.68787 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00575 |
| scoring_system |
epss |
| scoring_elements |
0.68797 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4503 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4503
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2xup-1er1-xuh1 |
|
| 2 |
| url |
VCID-7rmg-2u67-kqf3 |
| vulnerability_id |
VCID-7rmg-2u67-kqf3 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4509 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04937 |
| scoring_system |
epss |
| scoring_elements |
0.8964 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.04937 |
| scoring_system |
epss |
| scoring_elements |
0.89591 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.04937 |
| scoring_system |
epss |
| scoring_elements |
0.89594 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.04937 |
| scoring_system |
epss |
| scoring_elements |
0.89607 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.04937 |
| scoring_system |
epss |
| scoring_elements |
0.89608 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.04937 |
| scoring_system |
epss |
| scoring_elements |
0.89625 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.04937 |
| scoring_system |
epss |
| scoring_elements |
0.8963 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.04937 |
| scoring_system |
epss |
| scoring_elements |
0.89637 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.04937 |
| scoring_system |
epss |
| scoring_elements |
0.89635 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.04937 |
| scoring_system |
epss |
| scoring_elements |
0.89629 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.04937 |
| scoring_system |
epss |
| scoring_elements |
0.89644 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.04937 |
| scoring_system |
epss |
| scoring_elements |
0.89646 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4509 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4509
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7rmg-2u67-kqf3 |
|
| 3 |
| url |
VCID-88kb-em1q-77gc |
| vulnerability_id |
VCID-88kb-em1q-77gc |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4500 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03173 |
| scoring_system |
epss |
| scoring_elements |
0.86961 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03173 |
| scoring_system |
epss |
| scoring_elements |
0.86891 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03173 |
| scoring_system |
epss |
| scoring_elements |
0.86901 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03173 |
| scoring_system |
epss |
| scoring_elements |
0.8692 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03173 |
| scoring_system |
epss |
| scoring_elements |
0.86913 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03173 |
| scoring_system |
epss |
| scoring_elements |
0.86933 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03173 |
| scoring_system |
epss |
| scoring_elements |
0.86941 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03173 |
| scoring_system |
epss |
| scoring_elements |
0.86955 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03173 |
| scoring_system |
epss |
| scoring_elements |
0.8695 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03173 |
| scoring_system |
epss |
| scoring_elements |
0.86944 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.03173 |
| scoring_system |
epss |
| scoring_elements |
0.86959 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.03173 |
| scoring_system |
epss |
| scoring_elements |
0.86963 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4500 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4500
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-88kb-em1q-77gc |
|
| 4 |
| url |
VCID-9p7y-4cfe-ffag |
| vulnerability_id |
VCID-9p7y-4cfe-ffag |
| summary |
Security researcher Spandan Veggalam reported a crash while using the
debugger API with SavedStacks in JavaScript. This crash can only occurs when the debugger is in use but may be potentially exploitable. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4507 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01202 |
| scoring_system |
epss |
| scoring_elements |
0.78951 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01202 |
| scoring_system |
epss |
| scoring_elements |
0.78878 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01202 |
| scoring_system |
epss |
| scoring_elements |
0.78884 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01202 |
| scoring_system |
epss |
| scoring_elements |
0.78913 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01202 |
| scoring_system |
epss |
| scoring_elements |
0.78894 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01202 |
| scoring_system |
epss |
| scoring_elements |
0.78919 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01202 |
| scoring_system |
epss |
| scoring_elements |
0.78925 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.01202 |
| scoring_system |
epss |
| scoring_elements |
0.78949 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.01202 |
| scoring_system |
epss |
| scoring_elements |
0.78934 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01202 |
| scoring_system |
epss |
| scoring_elements |
0.78953 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4507 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4507
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9p7y-4cfe-ffag |
|
| 5 |
| url |
VCID-acvt-dayv-bffc |
| vulnerability_id |
VCID-acvt-dayv-bffc |
| summary |
Security researcher Felix Gröbert of Google discovered an out of
bounds read in the QCMS color management library while manipulating an image with specific
attributes in its ICC V4 profile. This causes a crash and could lead to information
disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4504 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02099 |
| scoring_system |
epss |
| scoring_elements |
0.84083 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02099 |
| scoring_system |
epss |
| scoring_elements |
0.83986 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02099 |
| scoring_system |
epss |
| scoring_elements |
0.84001 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02099 |
| scoring_system |
epss |
| scoring_elements |
0.84017 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02099 |
| scoring_system |
epss |
| scoring_elements |
0.84021 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02099 |
| scoring_system |
epss |
| scoring_elements |
0.84044 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02099 |
| scoring_system |
epss |
| scoring_elements |
0.8405 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02099 |
| scoring_system |
epss |
| scoring_elements |
0.84067 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02099 |
| scoring_system |
epss |
| scoring_elements |
0.84061 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02099 |
| scoring_system |
epss |
| scoring_elements |
0.84056 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02099 |
| scoring_system |
epss |
| scoring_elements |
0.84079 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.02099 |
| scoring_system |
epss |
| scoring_elements |
0.84082 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4504 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4504
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-acvt-dayv-bffc |
|
| 6 |
| url |
VCID-cs7b-d8pb-9udp |
| vulnerability_id |
VCID-cs7b-d8pb-9udp |
| summary |
Security researcher Looben Yang discovered a use-after-free
vulnerability when using a shared worker with IndexedDB due to a race condition with the
worker. This results in a potentially exploitable crash that can be triggered through web
content. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4510 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02515 |
| scoring_system |
epss |
| scoring_elements |
0.85421 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02515 |
| scoring_system |
epss |
| scoring_elements |
0.85326 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02515 |
| scoring_system |
epss |
| scoring_elements |
0.85338 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02515 |
| scoring_system |
epss |
| scoring_elements |
0.85357 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02515 |
| scoring_system |
epss |
| scoring_elements |
0.85359 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02515 |
| scoring_system |
epss |
| scoring_elements |
0.85381 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02515 |
| scoring_system |
epss |
| scoring_elements |
0.8539 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02515 |
| scoring_system |
epss |
| scoring_elements |
0.85405 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02515 |
| scoring_system |
epss |
| scoring_elements |
0.85403 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02515 |
| scoring_system |
epss |
| scoring_elements |
0.85399 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02515 |
| scoring_system |
epss |
| scoring_elements |
0.85423 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.02515 |
| scoring_system |
epss |
| scoring_elements |
0.85424 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4510 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4510
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cs7b-d8pb-9udp |
|
| 7 |
| url |
VCID-hacx-3yt1-bfgk |
| vulnerability_id |
VCID-hacx-3yt1-bfgk |
| summary |
Security researcher Francisco Alonso of the NowSecure Research Team
used the Address Sanitizer tool to discover an out-of-bounds read issue during 2D canvas
rendering. This was due to an issue in the cairo graphics library when surfaces are
created with 32-bit color depth but displayed on a 16-bit color depth system, which is
unsupported. This allows an attacker to read an amount of random memory following the heap
for the 16-bit surface leading to information disclosure.
This issue is specific to Linux in certain configurations and does not
affect Windows or OS X systems. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4512 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02006 |
| scoring_system |
epss |
| scoring_elements |
0.83717 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02006 |
| scoring_system |
epss |
| scoring_elements |
0.83615 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02006 |
| scoring_system |
epss |
| scoring_elements |
0.83627 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02006 |
| scoring_system |
epss |
| scoring_elements |
0.83642 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02006 |
| scoring_system |
epss |
| scoring_elements |
0.83644 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02006 |
| scoring_system |
epss |
| scoring_elements |
0.83668 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02006 |
| scoring_system |
epss |
| scoring_elements |
0.83675 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02006 |
| scoring_system |
epss |
| scoring_elements |
0.83692 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02006 |
| scoring_system |
epss |
| scoring_elements |
0.83685 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02006 |
| scoring_system |
epss |
| scoring_elements |
0.83681 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02006 |
| scoring_system |
epss |
| scoring_elements |
0.83716 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4512 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4512
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hacx-3yt1-bfgk |
|
| 8 |
| url |
VCID-kare-ffhq-93dc |
| vulnerability_id |
VCID-kare-ffhq-93dc |
| summary |
Security researcher André Bargull reported that when a web page
creates a scripted proxy for the window with a handler defined a certain way, a reference
to the inner window will be passed, rather than that of the outer window in violation of
the specification. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4502 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00775 |
| scoring_system |
epss |
| scoring_elements |
0.73649 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00775 |
| scoring_system |
epss |
| scoring_elements |
0.73546 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00775 |
| scoring_system |
epss |
| scoring_elements |
0.73555 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00775 |
| scoring_system |
epss |
| scoring_elements |
0.73578 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00775 |
| scoring_system |
epss |
| scoring_elements |
0.7355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00775 |
| scoring_system |
epss |
| scoring_elements |
0.73586 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00775 |
| scoring_system |
epss |
| scoring_elements |
0.73599 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00775 |
| scoring_system |
epss |
| scoring_elements |
0.73622 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00775 |
| scoring_system |
epss |
| scoring_elements |
0.73604 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00775 |
| scoring_system |
epss |
| scoring_elements |
0.73596 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00775 |
| scoring_system |
epss |
| scoring_elements |
0.7364 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4502 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4502
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kare-ffhq-93dc |
|
| 9 |
| url |
VCID-p86b-vnu2-6fbu |
| vulnerability_id |
VCID-p86b-vnu2-6fbu |
| summary |
Multiple vulnerabilities have been found in Firefox, Thunderbird,
Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
the worst of which may allow remote execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4483 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53303 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53197 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53221 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53246 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53214 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53266 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53261 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53312 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53297 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.5328 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53318 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53323 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4483 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4483
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p86b-vnu2-6fbu |
|
| 10 |
| url |
VCID-qeyy-sqj3-3kfp |
| vulnerability_id |
VCID-qeyy-sqj3-3kfp |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4511 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0396 |
| scoring_system |
epss |
| scoring_elements |
0.88376 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0396 |
| scoring_system |
epss |
| scoring_elements |
0.88309 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0396 |
| scoring_system |
epss |
| scoring_elements |
0.88317 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0396 |
| scoring_system |
epss |
| scoring_elements |
0.88331 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0396 |
| scoring_system |
epss |
| scoring_elements |
0.88336 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0396 |
| scoring_system |
epss |
| scoring_elements |
0.88355 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0396 |
| scoring_system |
epss |
| scoring_elements |
0.88362 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0396 |
| scoring_system |
epss |
| scoring_elements |
0.88372 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0396 |
| scoring_system |
epss |
| scoring_elements |
0.88364 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0396 |
| scoring_system |
epss |
| scoring_elements |
0.88379 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4511 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4511
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qeyy-sqj3-3kfp |
|
| 11 |
| url |
VCID-qjuf-f8ec-byc7 |
| vulnerability_id |
VCID-qjuf-f8ec-byc7 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4506 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07974 |
| scoring_system |
epss |
| scoring_elements |
0.92084 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.07974 |
| scoring_system |
epss |
| scoring_elements |
0.92045 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07974 |
| scoring_system |
epss |
| scoring_elements |
0.92051 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07974 |
| scoring_system |
epss |
| scoring_elements |
0.92058 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07974 |
| scoring_system |
epss |
| scoring_elements |
0.92063 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07974 |
| scoring_system |
epss |
| scoring_elements |
0.92075 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07974 |
| scoring_system |
epss |
| scoring_elements |
0.92078 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.07974 |
| scoring_system |
epss |
| scoring_elements |
0.92082 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.07974 |
| scoring_system |
epss |
| scoring_elements |
0.92089 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.07974 |
| scoring_system |
epss |
| scoring_elements |
0.92086 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4506 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4506
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qjuf-f8ec-byc7 |
|
| 12 |
| url |
VCID-sz8x-vmck-6yc5 |
| vulnerability_id |
VCID-sz8x-vmck-6yc5 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4519 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.63041 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62896 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62954 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62983 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62948 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62999 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.63015 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.63033 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.63019 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62996 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4519 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4519
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sz8x-vmck-6yc5 |
|
| 13 |
| url |
VCID-t7wm-9sa4-2yff |
| vulnerability_id |
VCID-t7wm-9sa4-2yff |
| summary |
Security researcher Ronald Crane reported two issues in the libGLES
portions of the ANGLE graphics library, used for WebGL and OpenGL content on Windows
systems. The first of these is a missing bounds check leading to memory safety errors when
manipulating shaders which could result in the writing to unowned memory. The second issue
also affects shaders when insufficient memory is allocated for a shader attribute array,
leading to a buffer overflow. Both of these issues can lead to a potentially exploitable
crash.
These issues are specific to Windows and does not affect Linux or OS X
systems.
In general this flaw cannot be exploited through email in the
Thunderbird product because scripting is disabled, but is potentially a risk in
browser or browser-like contexts. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7178 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81308 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81207 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81215 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81239 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81238 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81265 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81271 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81291 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81278 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.8127 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81307 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81309 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7178 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-7178
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t7wm-9sa4-2yff |
|
| 14 |
| url |
VCID-tmb8-vc5k-tbbc |
| vulnerability_id |
VCID-tmb8-vc5k-tbbc |
| summary |
Security researcher Juho Nurminen reported a mechanism to spoof the
URL displayed in the addressbar in reader mode by manipulating the loaded URL. This flaw
allows for the URL displayed to be different than that the web content rendered. This
allows for potential spoofing but the effects are mitigated due to the restrictions reader
mode places when rendering content. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4508 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71952 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71884 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71891 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71911 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71882 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71921 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71932 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71956 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71939 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71963 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00697 |
| scoring_system |
epss |
| scoring_elements |
0.71967 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4508 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4508
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tmb8-vc5k-tbbc |
|
| 15 |
| url |
VCID-uur2-nxhu-hkev |
| vulnerability_id |
VCID-uur2-nxhu-hkev |
| summary |
Multiple vulnerabilities have been found in Firefox, Thunderbird,
Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
the worst of which may allow remote execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4490 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.56587 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.5647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.56567 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.56588 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.56618 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.56623 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.56632 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.56607 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.56586 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.56617 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.56616 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4490 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4490
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uur2-nxhu-hkev |
|
| 16 |
| url |
VCID-vs2t-gwzk-6ubt |
| vulnerability_id |
VCID-vs2t-gwzk-6ubt |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4517 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03205 |
| scoring_system |
epss |
| scoring_elements |
0.8703 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03205 |
| scoring_system |
epss |
| scoring_elements |
0.86961 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03205 |
| scoring_system |
epss |
| scoring_elements |
0.86972 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03205 |
| scoring_system |
epss |
| scoring_elements |
0.86991 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03205 |
| scoring_system |
epss |
| scoring_elements |
0.86984 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03205 |
| scoring_system |
epss |
| scoring_elements |
0.87004 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03205 |
| scoring_system |
epss |
| scoring_elements |
0.87011 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03205 |
| scoring_system |
epss |
| scoring_elements |
0.87025 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03205 |
| scoring_system |
epss |
| scoring_elements |
0.87019 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03205 |
| scoring_system |
epss |
| scoring_elements |
0.87013 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.03205 |
| scoring_system |
epss |
| scoring_elements |
0.87029 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.03205 |
| scoring_system |
epss |
| scoring_elements |
0.87033 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4517 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4517
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vs2t-gwzk-6ubt |
|
| 17 |
| url |
VCID-wmk8-kk5t-ufdd |
| vulnerability_id |
VCID-wmk8-kk5t-ufdd |
| summary |
Multiple vulnerabilities have been found in Mozilla Firefox and
Thunderbird, the worst of which may allow user-assisted execution of
arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2742 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68185 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.6809 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68112 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68131 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68159 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68174 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68199 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68186 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68153 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68191 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68202 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2742 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-2742
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wmk8-kk5t-ufdd |
|
| 18 |
| url |
VCID-xnzh-y88g-guhd |
| vulnerability_id |
VCID-xnzh-y88g-guhd |
| summary |
Mozilla developer Jeff Walden reported that in Gecko's implementation
of ECMAScript 5 API's enforces non-configurable properties with logic specific to each API.
Scripts that do not go through these APIs can bypass these protections and make changes to
the immutable properties in violation of security protections. This could potentially
allow for web content to run in a privileged context leading to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4516 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01352 |
| scoring_system |
epss |
| scoring_elements |
0.80133 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01352 |
| scoring_system |
epss |
| scoring_elements |
0.80053 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01352 |
| scoring_system |
epss |
| scoring_elements |
0.80061 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01352 |
| scoring_system |
epss |
| scoring_elements |
0.80082 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01352 |
| scoring_system |
epss |
| scoring_elements |
0.8007 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01352 |
| scoring_system |
epss |
| scoring_elements |
0.80098 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01352 |
| scoring_system |
epss |
| scoring_elements |
0.80106 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01352 |
| scoring_system |
epss |
| scoring_elements |
0.80125 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01352 |
| scoring_system |
epss |
| scoring_elements |
0.80109 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01352 |
| scoring_system |
epss |
| scoring_elements |
0.80101 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01352 |
| scoring_system |
epss |
| scoring_elements |
0.8013 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01352 |
| scoring_system |
epss |
| scoring_elements |
0.80131 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4516 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4516
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xnzh-y88g-guhd |
|
| 19 |
| url |
VCID-y4jx-5cgd-kbbp |
| vulnerability_id |
VCID-y4jx-5cgd-kbbp |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4520 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69257 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69164 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.6918 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.692 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69182 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69232 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.6925 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69272 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69258 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69229 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69268 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69277 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-4520 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-4520
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y4jx-5cgd-kbbp |
|