Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/86808?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "type": "mozilla", "namespace": "", "name": "SeaMonkey", "version": "2.38.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51660?format=api", "vulnerability_id": "VCID-2rn3-ydxb-5ugu", "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n the worst of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4477.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4477.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4477", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86413", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86306", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86316", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86335", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86336", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86354", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86363", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86377", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86375", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86369", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86386", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86391", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86384", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0291", "scoring_system": "epss", "scoring_elements": "0.86403", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4477" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252277", "reference_id": "1252277", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4477", "reference_id": "CVE-2015-4477", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4477" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-81", "reference_id": "mfsa2015-81", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-81" }, { "reference_url": "https://usn.ubuntu.com/2702-1/", "reference_id": "USN-2702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4477" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2rn3-ydxb-5ugu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63744?format=api", "vulnerability_id": "VCID-2xup-1er1-xuh1", "summary": "Security researcher David Chan reported that Mozilla's\nmozTCPSocket implementation could leak data past the end of an array,\nallowing for the potential exposure of memory or private data to malicious servers.\nThis feature is used by Firefox OS and is disabled by default in Firefox\non other operating systems.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4503.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4503.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4503", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.6883", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.68681", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.68699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.68718", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.68696", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.68747", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.68766", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.68789", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.68774", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.68745", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.68787", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.68797", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.68776", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00575", "scoring_system": "epss", "scoring_elements": "0.68824", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4503" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265591", "reference_id": "1265591", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4503", "reference_id": "CVE-2015-4503", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4503" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-97", "reference_id": "mfsa2015-97", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-97" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4503" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2xup-1er1-xuh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60744?format=api", "vulnerability_id": "VCID-7rmg-2u67-kqf3", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4509.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4509.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89659", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89591", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89594", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89607", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89608", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89625", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.8963", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89637", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89635", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89629", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89644", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89646", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.8964", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89655", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265192", "reference_id": "1265192", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265192" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-106", "reference_id": "mfsa2015-106", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1852", "reference_id": "RHSA-2015:1852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1852" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4509" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7rmg-2u67-kqf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60740?format=api", "vulnerability_id": "VCID-88kb-em1q-77gc", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4500.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4500.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86985", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86891", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86901", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.8692", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86913", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86933", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86941", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86955", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.8695", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86944", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86959", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86963", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86961", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86979", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265186", "reference_id": "1265186", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265186" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-96", "reference_id": "mfsa2015-96", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-96" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1852", "reference_id": "RHSA-2015:1852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1852" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4500" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88kb-em1q-77gc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63729?format=api", "vulnerability_id": "VCID-9p7y-4cfe-ffag", "summary": "Security researcher Spandan Veggalam reported a crash while using the\ndebugger API with SavedStacks in JavaScript. This crash can only occurs when the debugger is in use but may be potentially exploitable.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4507.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4507.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4507", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78986", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78878", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78884", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78913", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78894", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78919", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78925", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78949", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78934", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78953", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78951", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78979", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4507" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265621", "reference_id": "1265621", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507", "reference_id": "CVE-2015-4507", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-102", "reference_id": "mfsa2015-102", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-102" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4507" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9p7y-4cfe-ffag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63732?format=api", "vulnerability_id": "VCID-acvt-dayv-bffc", "summary": "Security researcher Felix Gröbert of Google discovered an out of\nbounds read in the QCMS color management library while manipulating an image with specific\nattributes in its ICC V4 profile. This causes a crash and could lead to information\ndisclosure.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4504.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4504.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4504", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.84114", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.83986", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.84001", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.84017", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.84021", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.84044", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.8405", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.84067", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.84061", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.84056", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.84079", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.84082", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.84083", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02099", "scoring_system": "epss", "scoring_elements": "0.84108", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4504" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265596", "reference_id": "1265596", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4504", "reference_id": "CVE-2015-4504", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4504" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-98", "reference_id": "mfsa2015-98", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-98" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4504" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-acvt-dayv-bffc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63720?format=api", "vulnerability_id": "VCID-cs7b-d8pb-9udp", "summary": "Security researcher Looben Yang discovered a use-after-free\nvulnerability when using a shared worker with IndexedDB due to a race condition with the\nworker. This results in a potentially exploitable crash that can be triggered through web\ncontent.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4510.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4510.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4510", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.85453", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.85326", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.85338", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.85357", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.85359", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.85381", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.8539", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.85405", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.85403", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.85399", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.85423", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.85424", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.85421", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02515", "scoring_system": "epss", "scoring_elements": "0.85444", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4510" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265190", "reference_id": "1265190", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265190" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4510", "reference_id": "CVE-2015-4510", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4510" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-104", "reference_id": "mfsa2015-104", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-104" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4510" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cs7b-d8pb-9udp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63723?format=api", "vulnerability_id": "VCID-hacx-3yt1-bfgk", "summary": "Security researcher Francisco Alonso of the NowSecure Research Team\nused the Address Sanitizer tool to discover an out-of-bounds read issue during 2D canvas\nrendering. This was due to an issue in the cairo graphics library when surfaces are\ncreated with 32-bit color depth but displayed on a 16-bit color depth system, which is\nunsupported. This allows an attacker to read an amount of random memory following the heap\nfor the 16-bit surface leading to information disclosure.\nThis issue is specific to Linux in certain configurations and does not\naffect Windows or OS X systems.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4512.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4512.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4512", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02006", "scoring_system": "epss", "scoring_elements": "0.8375", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02006", "scoring_system": "epss", "scoring_elements": "0.83615", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02006", "scoring_system": "epss", "scoring_elements": "0.83627", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02006", "scoring_system": "epss", "scoring_elements": "0.83642", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02006", "scoring_system": "epss", "scoring_elements": "0.83644", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02006", "scoring_system": "epss", "scoring_elements": "0.83668", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02006", "scoring_system": "epss", "scoring_elements": "0.83675", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02006", "scoring_system": "epss", "scoring_elements": "0.83692", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02006", "scoring_system": "epss", "scoring_elements": "0.83685", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02006", "scoring_system": "epss", "scoring_elements": "0.83681", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02006", "scoring_system": "epss", "scoring_elements": "0.83716", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02006", "scoring_system": "epss", "scoring_elements": "0.83717", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02006", "scoring_system": "epss", "scoring_elements": "0.83742", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4512" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265769", "reference_id": "1265769", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265769" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4512", "reference_id": "CVE-2015-4512", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4512" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-107", "reference_id": "mfsa2015-107", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-107" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4512" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hacx-3yt1-bfgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63727?format=api", "vulnerability_id": "VCID-kare-ffhq-93dc", "summary": "Security researcher André Bargull reported that when a web page\ncreates a scripted proxy for the window with a handler defined a certain way, a reference\nto the inner window will be passed, rather than that of the outer window in violation of\nthe specification.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4502.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4502.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4502", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73682", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73546", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73555", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73578", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.7355", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73586", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73599", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73622", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73604", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73596", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.7364", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73649", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73673", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4502" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265771", "reference_id": "1265771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265771" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4502", "reference_id": "CVE-2015-4502", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4502" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-108", "reference_id": "mfsa2015-108", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-108" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4502" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kare-ffhq-93dc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51684?format=api", "vulnerability_id": "VCID-p86b-vnu2-6fbu", "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n the worst of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4483.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4483.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4483", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53285", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53197", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53221", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53246", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53214", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53266", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53312", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53297", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.5328", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53318", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53323", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53303", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53274", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4483" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252288", "reference_id": "1252288", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252288" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4483", "reference_id": "CVE-2015-4483", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4483" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-86", "reference_id": "mfsa2015-86", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-86" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4483" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p86b-vnu2-6fbu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60746?format=api", "vulnerability_id": "VCID-qeyy-sqj3-3kfp", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4511.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4511.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88397", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88309", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88317", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88331", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88336", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88355", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88362", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88372", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88364", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88379", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88376", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88392", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265630", "reference_id": "1265630", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265630" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-105", "reference_id": "mfsa2015-105", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4511" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qeyy-sqj3-3kfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60742?format=api", "vulnerability_id": "VCID-qjuf-f8ec-byc7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4506.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4506.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92084", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92045", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92051", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92058", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92075", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92078", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92082", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92089", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92086", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265617", "reference_id": "1265617", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265617" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-101", "reference_id": "mfsa2015-101", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4506" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qjuf-f8ec-byc7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60750?format=api", "vulnerability_id": "VCID-sz8x-vmck-6yc5", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4519.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4519.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63054", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62954", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62983", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62999", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63015", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63033", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63019", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62996", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63041", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.6304", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265778", "reference_id": "1265778", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265778" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-110", "reference_id": "mfsa2015-110", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1852", "reference_id": "RHSA-2015:1852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1852" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4519" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sz8x-vmck-6yc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63716?format=api", "vulnerability_id": "VCID-t7wm-9sa4-2yff", "summary": "Security researcher Ronald Crane reported two issues in the libGLES\nportions of the ANGLE graphics library, used for WebGL and OpenGL content on Windows\nsystems. The first of these is a missing bounds check leading to memory safety errors when\nmanipulating shaders which could result in the writing to unowned memory. The second issue\nalso affects shaders when insufficient memory is allocated for a shader attribute array,\nleading to a buffer overflow. Both of these issues can lead to a potentially exploitable\ncrash.\nThese issues are specific to Windows and does not affect Linux or OS X\nsystems.\nIn general this flaw cannot be exploited through email in the\nThunderbird product because scripting is disabled, but is potentially a risk in\nbrowser or browser-like contexts.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7178.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7178.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7178", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81337", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81207", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81215", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81239", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81238", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81265", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81271", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81291", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81278", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.8127", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81307", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81309", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81308", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.8133", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7178" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265201", "reference_id": "1265201", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7178", "reference_id": "CVE-2015-7178", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7178" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-113", "reference_id": "mfsa2015-113", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-113" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-7178" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t7wm-9sa4-2yff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63742?format=api", "vulnerability_id": "VCID-tmb8-vc5k-tbbc", "summary": "Security researcher Juho Nurminen reported a mechanism to spoof the\nURL displayed in the addressbar in reader mode by manipulating the loaded URL. This flaw\nallows for the URL displayed to be different than that the web content rendered. This\nallows for potential spoofing but the effects are mitigated due to the restrictions reader\nmode places when rendering content.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4508.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4508.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4508", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.72003", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71884", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71891", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71911", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71882", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71921", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71932", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71956", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71939", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71963", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71967", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71952", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00697", "scoring_system": "epss", "scoring_elements": "0.71996", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4508" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265624", "reference_id": "1265624", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4508", "reference_id": "CVE-2015-4508", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4508" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-103", "reference_id": "mfsa2015-103", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-103" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4508" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmb8-vc5k-tbbc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51703?format=api", "vulnerability_id": "VCID-uur2-nxhu-hkev", "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n the worst of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4490.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4490.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4490", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.5654", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.5647", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56567", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56588", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56618", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56623", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56632", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56607", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56586", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56617", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56616", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56587", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56522", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4490" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252294", "reference_id": "1252294", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4490", "reference_id": "CVE-2015-4490", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4490" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-91", "reference_id": "mfsa2015-91", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-91" }, { "reference_url": "https://usn.ubuntu.com/2702-1/", "reference_id": "USN-2702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4490" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uur2-nxhu-hkev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60749?format=api", "vulnerability_id": "VCID-vs2t-gwzk-6ubt", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4517.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4517.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87055", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.86961", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.86972", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.86991", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.86984", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87004", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87011", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87025", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87013", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87029", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87033", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.8703", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.8705", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265784", "reference_id": "1265784", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265784" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-112", "reference_id": "mfsa2015-112", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1852", "reference_id": "RHSA-2015:1852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1852" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4517" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vs2t-gwzk-6ubt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41213?format=api", "vulnerability_id": "VCID-wmk8-kk5t-ufdd", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird, the worst of which may allow user-assisted execution of\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2742", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68236", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.6809", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68112", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68131", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68159", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68174", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68199", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68186", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68191", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68202", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68185", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68227", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2742", "reference_id": "CVE-2015-2742", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2742" }, { "reference_url": "https://security.gentoo.org/glsa/201512-10", "reference_id": "GLSA-201512-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-68", "reference_id": "mfsa2015-68", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-68" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-2742" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wmk8-kk5t-ufdd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63730?format=api", "vulnerability_id": "VCID-xnzh-y88g-guhd", "summary": "Mozilla developer Jeff Walden reported that in Gecko's implementation\nof ECMAScript 5 API's enforces non-configurable properties with logic specific to each API.\nScripts that do not go through these APIs can bypass these protections and make changes to\nthe immutable properties in violation of security protections. This could potentially\nallow for web content to run in a privileged context leading to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4516.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4516.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4516", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.80168", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.80053", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.80061", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.80082", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.8007", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.80098", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.80106", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.80125", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.80109", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.80101", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.8013", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.80131", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.80133", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01352", "scoring_system": "epss", "scoring_elements": "0.80161", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4516" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265775", "reference_id": "1265775", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265775" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4516", "reference_id": "CVE-2015-4516", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4516" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-109", "reference_id": "mfsa2015-109", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-109" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4516" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xnzh-y88g-guhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60751?format=api", "vulnerability_id": "VCID-y4jx-5cgd-kbbp", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4520.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4520.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69315", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69164", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.6918", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.692", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69182", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.6925", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69272", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69258", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69229", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69268", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69277", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69257", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69308", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265781", "reference_id": "1265781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265781" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-111", "reference_id": "mfsa2015-111", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1852", "reference_id": "RHSA-2015:1852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1852" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86808?format=api", "purl": "pkg:mozilla/SeaMonkey@2.38.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" } ], "aliases": [ "CVE-2015-4520" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y4jx-5cgd-kbbp" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0" }