Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/Firefox@41.0.0
Typemozilla
Namespace
NameFirefox
Version41.0.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version41.0.2
Latest_non_vulnerable_version150.0.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2xup-1er1-xuh1
vulnerability_id VCID-2xup-1er1-xuh1
summary
Security researcher David Chan reported that Mozilla's
mozTCPSocket implementation could leak data past the end of an array,
allowing for the potential exposure of memory or private data to malicious servers.
This feature is used by Firefox OS and is disabled by default in Firefox
on other operating systems.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4503.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4503
reference_id
reference_type
scores
0
value 0.00575
scoring_system epss
scoring_elements 0.68776
published_at 2026-04-21T12:55:00Z
1
value 0.00575
scoring_system epss
scoring_elements 0.68681
published_at 2026-04-01T12:55:00Z
2
value 0.00575
scoring_system epss
scoring_elements 0.68699
published_at 2026-04-02T12:55:00Z
3
value 0.00575
scoring_system epss
scoring_elements 0.68718
published_at 2026-04-04T12:55:00Z
4
value 0.00575
scoring_system epss
scoring_elements 0.68696
published_at 2026-04-07T12:55:00Z
5
value 0.00575
scoring_system epss
scoring_elements 0.68747
published_at 2026-04-08T12:55:00Z
6
value 0.00575
scoring_system epss
scoring_elements 0.68766
published_at 2026-04-09T12:55:00Z
7
value 0.00575
scoring_system epss
scoring_elements 0.68789
published_at 2026-04-11T12:55:00Z
8
value 0.00575
scoring_system epss
scoring_elements 0.68774
published_at 2026-04-12T12:55:00Z
9
value 0.00575
scoring_system epss
scoring_elements 0.68745
published_at 2026-04-13T12:55:00Z
10
value 0.00575
scoring_system epss
scoring_elements 0.68787
published_at 2026-04-16T12:55:00Z
11
value 0.00575
scoring_system epss
scoring_elements 0.68797
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4503
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265591
reference_id 1265591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265591
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4503
reference_id CVE-2015-4503
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4503
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-97
reference_id mfsa2015-97
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-97
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4503
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2xup-1er1-xuh1
1
url VCID-7rmg-2u67-kqf3
vulnerability_id VCID-7rmg-2u67-kqf3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4509.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4509.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4509
reference_id
reference_type
scores
0
value 0.04937
scoring_system epss
scoring_elements 0.8964
published_at 2026-04-21T12:55:00Z
1
value 0.04937
scoring_system epss
scoring_elements 0.89591
published_at 2026-04-01T12:55:00Z
2
value 0.04937
scoring_system epss
scoring_elements 0.89594
published_at 2026-04-02T12:55:00Z
3
value 0.04937
scoring_system epss
scoring_elements 0.89607
published_at 2026-04-04T12:55:00Z
4
value 0.04937
scoring_system epss
scoring_elements 0.89608
published_at 2026-04-07T12:55:00Z
5
value 0.04937
scoring_system epss
scoring_elements 0.89625
published_at 2026-04-08T12:55:00Z
6
value 0.04937
scoring_system epss
scoring_elements 0.8963
published_at 2026-04-09T12:55:00Z
7
value 0.04937
scoring_system epss
scoring_elements 0.89637
published_at 2026-04-11T12:55:00Z
8
value 0.04937
scoring_system epss
scoring_elements 0.89635
published_at 2026-04-12T12:55:00Z
9
value 0.04937
scoring_system epss
scoring_elements 0.89629
published_at 2026-04-13T12:55:00Z
10
value 0.04937
scoring_system epss
scoring_elements 0.89644
published_at 2026-04-16T12:55:00Z
11
value 0.04937
scoring_system epss
scoring_elements 0.89646
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4509
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265192
reference_id 1265192
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265192
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-106
reference_id mfsa2015-106
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-106
18
reference_url https://access.redhat.com/errata/RHSA-2015:1834
reference_id RHSA-2015:1834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1834
19
reference_url https://access.redhat.com/errata/RHSA-2015:1852
reference_id RHSA-2015:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1852
20
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
21
reference_url https://usn.ubuntu.com/2754-1/
reference_id USN-2754-1
reference_type
scores
url https://usn.ubuntu.com/2754-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4509
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7rmg-2u67-kqf3
2
url VCID-88kb-em1q-77gc
vulnerability_id VCID-88kb-em1q-77gc
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4500.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4500.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4500
reference_id
reference_type
scores
0
value 0.03173
scoring_system epss
scoring_elements 0.86961
published_at 2026-04-21T12:55:00Z
1
value 0.03173
scoring_system epss
scoring_elements 0.86891
published_at 2026-04-01T12:55:00Z
2
value 0.03173
scoring_system epss
scoring_elements 0.86901
published_at 2026-04-02T12:55:00Z
3
value 0.03173
scoring_system epss
scoring_elements 0.8692
published_at 2026-04-04T12:55:00Z
4
value 0.03173
scoring_system epss
scoring_elements 0.86913
published_at 2026-04-07T12:55:00Z
5
value 0.03173
scoring_system epss
scoring_elements 0.86933
published_at 2026-04-08T12:55:00Z
6
value 0.03173
scoring_system epss
scoring_elements 0.86941
published_at 2026-04-09T12:55:00Z
7
value 0.03173
scoring_system epss
scoring_elements 0.86955
published_at 2026-04-11T12:55:00Z
8
value 0.03173
scoring_system epss
scoring_elements 0.8695
published_at 2026-04-12T12:55:00Z
9
value 0.03173
scoring_system epss
scoring_elements 0.86944
published_at 2026-04-13T12:55:00Z
10
value 0.03173
scoring_system epss
scoring_elements 0.86959
published_at 2026-04-16T12:55:00Z
11
value 0.03173
scoring_system epss
scoring_elements 0.86963
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4500
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265186
reference_id 1265186
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265186
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-96
reference_id mfsa2015-96
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-96
18
reference_url https://access.redhat.com/errata/RHSA-2015:1834
reference_id RHSA-2015:1834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1834
19
reference_url https://access.redhat.com/errata/RHSA-2015:1852
reference_id RHSA-2015:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1852
20
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
21
reference_url https://usn.ubuntu.com/2754-1/
reference_id USN-2754-1
reference_type
scores
url https://usn.ubuntu.com/2754-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4500
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-88kb-em1q-77gc
3
url VCID-9p7y-4cfe-ffag
vulnerability_id VCID-9p7y-4cfe-ffag
summary
Security researcher Spandan Veggalam reported a crash while using the
debugger API with SavedStacks in JavaScript. This crash can only occurs when the debugger is in use but may be potentially exploitable.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4507.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4507.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4507
reference_id
reference_type
scores
0
value 0.01202
scoring_system epss
scoring_elements 0.78951
published_at 2026-04-18T12:55:00Z
1
value 0.01202
scoring_system epss
scoring_elements 0.78878
published_at 2026-04-01T12:55:00Z
2
value 0.01202
scoring_system epss
scoring_elements 0.78884
published_at 2026-04-02T12:55:00Z
3
value 0.01202
scoring_system epss
scoring_elements 0.78913
published_at 2026-04-04T12:55:00Z
4
value 0.01202
scoring_system epss
scoring_elements 0.78894
published_at 2026-04-07T12:55:00Z
5
value 0.01202
scoring_system epss
scoring_elements 0.78919
published_at 2026-04-08T12:55:00Z
6
value 0.01202
scoring_system epss
scoring_elements 0.78925
published_at 2026-04-13T12:55:00Z
7
value 0.01202
scoring_system epss
scoring_elements 0.78949
published_at 2026-04-21T12:55:00Z
8
value 0.01202
scoring_system epss
scoring_elements 0.78934
published_at 2026-04-12T12:55:00Z
9
value 0.01202
scoring_system epss
scoring_elements 0.78953
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4507
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265621
reference_id 1265621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265621
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507
reference_id CVE-2015-4507
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-102
reference_id mfsa2015-102
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-102
5
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4507
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9p7y-4cfe-ffag
4
url VCID-acvt-dayv-bffc
vulnerability_id VCID-acvt-dayv-bffc
summary
Security researcher Felix Gröbert of Google discovered an out of
bounds read in the QCMS color management library while manipulating an image with specific
attributes in its ICC V4 profile. This causes a crash and could lead to information
disclosure.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4504.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4504.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4504
reference_id
reference_type
scores
0
value 0.02099
scoring_system epss
scoring_elements 0.84083
published_at 2026-04-21T12:55:00Z
1
value 0.02099
scoring_system epss
scoring_elements 0.83986
published_at 2026-04-01T12:55:00Z
2
value 0.02099
scoring_system epss
scoring_elements 0.84001
published_at 2026-04-02T12:55:00Z
3
value 0.02099
scoring_system epss
scoring_elements 0.84017
published_at 2026-04-04T12:55:00Z
4
value 0.02099
scoring_system epss
scoring_elements 0.84021
published_at 2026-04-07T12:55:00Z
5
value 0.02099
scoring_system epss
scoring_elements 0.84044
published_at 2026-04-08T12:55:00Z
6
value 0.02099
scoring_system epss
scoring_elements 0.8405
published_at 2026-04-09T12:55:00Z
7
value 0.02099
scoring_system epss
scoring_elements 0.84067
published_at 2026-04-11T12:55:00Z
8
value 0.02099
scoring_system epss
scoring_elements 0.84061
published_at 2026-04-12T12:55:00Z
9
value 0.02099
scoring_system epss
scoring_elements 0.84056
published_at 2026-04-13T12:55:00Z
10
value 0.02099
scoring_system epss
scoring_elements 0.84079
published_at 2026-04-16T12:55:00Z
11
value 0.02099
scoring_system epss
scoring_elements 0.84082
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4504
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265596
reference_id 1265596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265596
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4504
reference_id CVE-2015-4504
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4504
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-98
reference_id mfsa2015-98
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-98
5
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4504
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-acvt-dayv-bffc
5
url VCID-cs7b-d8pb-9udp
vulnerability_id VCID-cs7b-d8pb-9udp
summary
Security researcher Looben Yang discovered a use-after-free
vulnerability when using a shared worker with IndexedDB due to a race condition with the
worker. This results in a potentially exploitable crash that can be triggered through web
content.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4510.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4510.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4510
reference_id
reference_type
scores
0
value 0.02515
scoring_system epss
scoring_elements 0.85421
published_at 2026-04-21T12:55:00Z
1
value 0.02515
scoring_system epss
scoring_elements 0.85326
published_at 2026-04-01T12:55:00Z
2
value 0.02515
scoring_system epss
scoring_elements 0.85338
published_at 2026-04-02T12:55:00Z
3
value 0.02515
scoring_system epss
scoring_elements 0.85357
published_at 2026-04-04T12:55:00Z
4
value 0.02515
scoring_system epss
scoring_elements 0.85359
published_at 2026-04-07T12:55:00Z
5
value 0.02515
scoring_system epss
scoring_elements 0.85381
published_at 2026-04-08T12:55:00Z
6
value 0.02515
scoring_system epss
scoring_elements 0.8539
published_at 2026-04-09T12:55:00Z
7
value 0.02515
scoring_system epss
scoring_elements 0.85405
published_at 2026-04-11T12:55:00Z
8
value 0.02515
scoring_system epss
scoring_elements 0.85403
published_at 2026-04-12T12:55:00Z
9
value 0.02515
scoring_system epss
scoring_elements 0.85399
published_at 2026-04-13T12:55:00Z
10
value 0.02515
scoring_system epss
scoring_elements 0.85423
published_at 2026-04-16T12:55:00Z
11
value 0.02515
scoring_system epss
scoring_elements 0.85424
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4510
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265190
reference_id 1265190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265190
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4510
reference_id CVE-2015-4510
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4510
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-104
reference_id mfsa2015-104
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-104
5
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4510
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cs7b-d8pb-9udp
6
url VCID-ecr4-p51g-bygd
vulnerability_id VCID-ecr4-p51g-bygd
summary
Security researcher Holger Fuhrmannek reported that when the
Mozilla updater is run, the updater can be manipulated to load the updated files from a
working directory under user control in concert with junctions. When the updates are run
by the Mozilla Maintenance Service on Windows, these malicious files can be run with
elevated privileges and be used to replace arbitrary files on the system. This could allow
for arbitrary code execution by a malicious user with local system access but does not
allow for exploitation by web content.
This issue is specific to Windows and does not affect Linux or OS X
systems.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4505.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4505.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4505
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28521
published_at 2026-04-21T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28621
published_at 2026-04-12T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28704
published_at 2026-04-02T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28752
published_at 2026-04-04T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28559
published_at 2026-04-07T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28624
published_at 2026-04-08T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28664
published_at 2026-04-09T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28665
published_at 2026-04-11T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28573
published_at 2026-04-13T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28593
published_at 2026-04-16T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28568
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4505
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265610
reference_id 1265610
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265610
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4505
reference_id CVE-2015-4505
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4505
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-100
reference_id mfsa2015-100
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-100
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4505
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ecr4-p51g-bygd
7
url VCID-hacx-3yt1-bfgk
vulnerability_id VCID-hacx-3yt1-bfgk
summary
Security researcher Francisco Alonso of the NowSecure Research Team
used the Address Sanitizer tool to discover an out-of-bounds read issue during 2D canvas
rendering. This was due to an issue in the cairo graphics library when surfaces are
created with 32-bit color depth but displayed on a 16-bit color depth system, which is
unsupported. This allows an attacker to read an amount of random memory following the heap
for the 16-bit surface leading to information disclosure.
This issue is specific to Linux in certain configurations and does not
affect Windows or OS X systems.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4512.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4512.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4512
reference_id
reference_type
scores
0
value 0.02006
scoring_system epss
scoring_elements 0.83717
published_at 2026-04-21T12:55:00Z
1
value 0.02006
scoring_system epss
scoring_elements 0.83615
published_at 2026-04-01T12:55:00Z
2
value 0.02006
scoring_system epss
scoring_elements 0.83627
published_at 2026-04-02T12:55:00Z
3
value 0.02006
scoring_system epss
scoring_elements 0.83642
published_at 2026-04-04T12:55:00Z
4
value 0.02006
scoring_system epss
scoring_elements 0.83644
published_at 2026-04-07T12:55:00Z
5
value 0.02006
scoring_system epss
scoring_elements 0.83668
published_at 2026-04-08T12:55:00Z
6
value 0.02006
scoring_system epss
scoring_elements 0.83675
published_at 2026-04-09T12:55:00Z
7
value 0.02006
scoring_system epss
scoring_elements 0.83692
published_at 2026-04-11T12:55:00Z
8
value 0.02006
scoring_system epss
scoring_elements 0.83685
published_at 2026-04-12T12:55:00Z
9
value 0.02006
scoring_system epss
scoring_elements 0.83681
published_at 2026-04-13T12:55:00Z
10
value 0.02006
scoring_system epss
scoring_elements 0.83716
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4512
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265769
reference_id 1265769
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265769
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4512
reference_id CVE-2015-4512
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4512
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-107
reference_id mfsa2015-107
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-107
5
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4512
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hacx-3yt1-bfgk
8
url VCID-hf9p-ajjz-k3ft
vulnerability_id VCID-hf9p-ajjz-k3ft
summary
Security researcher Jordi Chancel reported that on Firefox for
Android, when a URL is pasted with an unknown protocol, such as secure: or
httpz:, the pasted URL is shown in the addressbar but no navigation occurs.
Other addressbar attributes present before this pasted URL is entered will continue to be
rendered. This could lead to potential spoofing by a malicious site. 
 This issue only affects Firefox for Android and does not affect Firefox on
OS X, Linux, or Windows operating systems.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4476.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4476.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4476
reference_id
reference_type
scores
0
value 0.00483
scoring_system epss
scoring_elements 0.65219
published_at 2026-04-21T12:55:00Z
1
value 0.00483
scoring_system epss
scoring_elements 0.65111
published_at 2026-04-01T12:55:00Z
2
value 0.00483
scoring_system epss
scoring_elements 0.65161
published_at 2026-04-02T12:55:00Z
3
value 0.00483
scoring_system epss
scoring_elements 0.65186
published_at 2026-04-04T12:55:00Z
4
value 0.00483
scoring_system epss
scoring_elements 0.65152
published_at 2026-04-07T12:55:00Z
5
value 0.00483
scoring_system epss
scoring_elements 0.65202
published_at 2026-04-08T12:55:00Z
6
value 0.00483
scoring_system epss
scoring_elements 0.65214
published_at 2026-04-09T12:55:00Z
7
value 0.00483
scoring_system epss
scoring_elements 0.65233
published_at 2026-04-11T12:55:00Z
8
value 0.00483
scoring_system epss
scoring_elements 0.6522
published_at 2026-04-12T12:55:00Z
9
value 0.00483
scoring_system epss
scoring_elements 0.65192
published_at 2026-04-13T12:55:00Z
10
value 0.00483
scoring_system epss
scoring_elements 0.65227
published_at 2026-04-16T12:55:00Z
11
value 0.00483
scoring_system epss
scoring_elements 0.65237
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4476
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265603
reference_id 1265603
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265603
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4476
reference_id CVE-2015-4476
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4476
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-99
reference_id mfsa2015-99
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-99
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4476
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hf9p-ajjz-k3ft
9
url VCID-kare-ffhq-93dc
vulnerability_id VCID-kare-ffhq-93dc
summary
Security researcher André Bargull reported that when a web page
creates a scripted proxy for the window with a handler defined a certain way, a reference
to the inner window will be passed, rather than that of the outer window in violation of
the specification.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4502.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4502
reference_id
reference_type
scores
0
value 0.00775
scoring_system epss
scoring_elements 0.73649
published_at 2026-04-18T12:55:00Z
1
value 0.00775
scoring_system epss
scoring_elements 0.73546
published_at 2026-04-01T12:55:00Z
2
value 0.00775
scoring_system epss
scoring_elements 0.73555
published_at 2026-04-02T12:55:00Z
3
value 0.00775
scoring_system epss
scoring_elements 0.73578
published_at 2026-04-04T12:55:00Z
4
value 0.00775
scoring_system epss
scoring_elements 0.7355
published_at 2026-04-07T12:55:00Z
5
value 0.00775
scoring_system epss
scoring_elements 0.73586
published_at 2026-04-08T12:55:00Z
6
value 0.00775
scoring_system epss
scoring_elements 0.73599
published_at 2026-04-09T12:55:00Z
7
value 0.00775
scoring_system epss
scoring_elements 0.73622
published_at 2026-04-11T12:55:00Z
8
value 0.00775
scoring_system epss
scoring_elements 0.73604
published_at 2026-04-12T12:55:00Z
9
value 0.00775
scoring_system epss
scoring_elements 0.73596
published_at 2026-04-13T12:55:00Z
10
value 0.00775
scoring_system epss
scoring_elements 0.7364
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4502
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265771
reference_id 1265771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265771
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4502
reference_id CVE-2015-4502
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4502
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-108
reference_id mfsa2015-108
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-108
5
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4502
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kare-ffhq-93dc
10
url VCID-qeyy-sqj3-3kfp
vulnerability_id VCID-qeyy-sqj3-3kfp
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4511.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4511
reference_id
reference_type
scores
0
value 0.0396
scoring_system epss
scoring_elements 0.88376
published_at 2026-04-21T12:55:00Z
1
value 0.0396
scoring_system epss
scoring_elements 0.88309
published_at 2026-04-01T12:55:00Z
2
value 0.0396
scoring_system epss
scoring_elements 0.88317
published_at 2026-04-02T12:55:00Z
3
value 0.0396
scoring_system epss
scoring_elements 0.88331
published_at 2026-04-04T12:55:00Z
4
value 0.0396
scoring_system epss
scoring_elements 0.88336
published_at 2026-04-07T12:55:00Z
5
value 0.0396
scoring_system epss
scoring_elements 0.88355
published_at 2026-04-08T12:55:00Z
6
value 0.0396
scoring_system epss
scoring_elements 0.88362
published_at 2026-04-09T12:55:00Z
7
value 0.0396
scoring_system epss
scoring_elements 0.88372
published_at 2026-04-11T12:55:00Z
8
value 0.0396
scoring_system epss
scoring_elements 0.88364
published_at 2026-04-13T12:55:00Z
9
value 0.0396
scoring_system epss
scoring_elements 0.88379
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4511
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265630
reference_id 1265630
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265630
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-105
reference_id mfsa2015-105
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-105
18
reference_url https://access.redhat.com/errata/RHSA-2015:1834
reference_id RHSA-2015:1834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1834
19
reference_url https://usn.ubuntu.com/2754-1/
reference_id USN-2754-1
reference_type
scores
url https://usn.ubuntu.com/2754-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4511
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qeyy-sqj3-3kfp
11
url VCID-qjuf-f8ec-byc7
vulnerability_id VCID-qjuf-f8ec-byc7
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4506.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4506.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4506
reference_id
reference_type
scores
0
value 0.07974
scoring_system epss
scoring_elements 0.92084
published_at 2026-04-21T12:55:00Z
1
value 0.07974
scoring_system epss
scoring_elements 0.92045
published_at 2026-04-01T12:55:00Z
2
value 0.07974
scoring_system epss
scoring_elements 0.92051
published_at 2026-04-02T12:55:00Z
3
value 0.07974
scoring_system epss
scoring_elements 0.92058
published_at 2026-04-04T12:55:00Z
4
value 0.07974
scoring_system epss
scoring_elements 0.92063
published_at 2026-04-07T12:55:00Z
5
value 0.07974
scoring_system epss
scoring_elements 0.92075
published_at 2026-04-08T12:55:00Z
6
value 0.07974
scoring_system epss
scoring_elements 0.92078
published_at 2026-04-13T12:55:00Z
7
value 0.07974
scoring_system epss
scoring_elements 0.92082
published_at 2026-04-12T12:55:00Z
8
value 0.07974
scoring_system epss
scoring_elements 0.92089
published_at 2026-04-16T12:55:00Z
9
value 0.07974
scoring_system epss
scoring_elements 0.92086
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4506
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265617
reference_id 1265617
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265617
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-101
reference_id mfsa2015-101
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-101
18
reference_url https://access.redhat.com/errata/RHSA-2015:1834
reference_id RHSA-2015:1834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1834
19
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
20
reference_url https://usn.ubuntu.com/2754-1/
reference_id USN-2754-1
reference_type
scores
url https://usn.ubuntu.com/2754-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4506
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjuf-f8ec-byc7
12
url VCID-sz8x-vmck-6yc5
vulnerability_id VCID-sz8x-vmck-6yc5
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4519.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4519.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4519
reference_id
reference_type
scores
0
value 0.00436
scoring_system epss
scoring_elements 0.63041
published_at 2026-04-18T12:55:00Z
1
value 0.00436
scoring_system epss
scoring_elements 0.62896
published_at 2026-04-01T12:55:00Z
2
value 0.00436
scoring_system epss
scoring_elements 0.62954
published_at 2026-04-02T12:55:00Z
3
value 0.00436
scoring_system epss
scoring_elements 0.62983
published_at 2026-04-04T12:55:00Z
4
value 0.00436
scoring_system epss
scoring_elements 0.62948
published_at 2026-04-07T12:55:00Z
5
value 0.00436
scoring_system epss
scoring_elements 0.62999
published_at 2026-04-08T12:55:00Z
6
value 0.00436
scoring_system epss
scoring_elements 0.63015
published_at 2026-04-09T12:55:00Z
7
value 0.00436
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-16T12:55:00Z
8
value 0.00436
scoring_system epss
scoring_elements 0.63019
published_at 2026-04-21T12:55:00Z
9
value 0.00436
scoring_system epss
scoring_elements 0.62996
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4519
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265778
reference_id 1265778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265778
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-110
reference_id mfsa2015-110
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-110
18
reference_url https://access.redhat.com/errata/RHSA-2015:1834
reference_id RHSA-2015:1834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1834
19
reference_url https://access.redhat.com/errata/RHSA-2015:1852
reference_id RHSA-2015:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1852
20
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
21
reference_url https://usn.ubuntu.com/2754-1/
reference_id USN-2754-1
reference_type
scores
url https://usn.ubuntu.com/2754-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4519
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sz8x-vmck-6yc5
13
url VCID-t7wm-9sa4-2yff
vulnerability_id VCID-t7wm-9sa4-2yff
summary
Security researcher Ronald Crane reported two issues in the libGLES
portions of the ANGLE graphics library, used for WebGL and OpenGL content on Windows
systems. The first of these is a missing bounds check leading to memory safety errors when
manipulating shaders which could result in the writing to unowned memory. The second issue
also affects shaders when insufficient memory is allocated for a shader attribute array,
leading to a buffer overflow. Both of these issues can lead to a potentially exploitable
crash.
These issues are specific to Windows and does not affect Linux or OS X
systems.
In general this flaw cannot be exploited through email in the
Thunderbird product because scripting is disabled, but is potentially a risk in
browser or browser-like contexts.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7178.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7178
reference_id
reference_type
scores
0
value 0.01524
scoring_system epss
scoring_elements 0.81308
published_at 2026-04-21T12:55:00Z
1
value 0.01524
scoring_system epss
scoring_elements 0.81207
published_at 2026-04-01T12:55:00Z
2
value 0.01524
scoring_system epss
scoring_elements 0.81215
published_at 2026-04-02T12:55:00Z
3
value 0.01524
scoring_system epss
scoring_elements 0.81239
published_at 2026-04-04T12:55:00Z
4
value 0.01524
scoring_system epss
scoring_elements 0.81238
published_at 2026-04-07T12:55:00Z
5
value 0.01524
scoring_system epss
scoring_elements 0.81265
published_at 2026-04-08T12:55:00Z
6
value 0.01524
scoring_system epss
scoring_elements 0.81271
published_at 2026-04-09T12:55:00Z
7
value 0.01524
scoring_system epss
scoring_elements 0.81291
published_at 2026-04-11T12:55:00Z
8
value 0.01524
scoring_system epss
scoring_elements 0.81278
published_at 2026-04-12T12:55:00Z
9
value 0.01524
scoring_system epss
scoring_elements 0.8127
published_at 2026-04-13T12:55:00Z
10
value 0.01524
scoring_system epss
scoring_elements 0.81307
published_at 2026-04-16T12:55:00Z
11
value 0.01524
scoring_system epss
scoring_elements 0.81309
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7178
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265201
reference_id 1265201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265201
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7178
reference_id CVE-2015-7178
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7178
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-113
reference_id mfsa2015-113
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-113
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-7178
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t7wm-9sa4-2yff
14
url VCID-tmb8-vc5k-tbbc
vulnerability_id VCID-tmb8-vc5k-tbbc
summary
Security researcher Juho Nurminen reported a mechanism to spoof the
URL displayed in the addressbar in reader mode by manipulating the loaded URL. This flaw
allows for the URL displayed to be different than that the web content rendered. This
allows for potential spoofing but the effects are mitigated due to the restrictions reader
mode places when rendering content.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4508.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4508.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4508
reference_id
reference_type
scores
0
value 0.00697
scoring_system epss
scoring_elements 0.71952
published_at 2026-04-21T12:55:00Z
1
value 0.00697
scoring_system epss
scoring_elements 0.71884
published_at 2026-04-01T12:55:00Z
2
value 0.00697
scoring_system epss
scoring_elements 0.71891
published_at 2026-04-02T12:55:00Z
3
value 0.00697
scoring_system epss
scoring_elements 0.71911
published_at 2026-04-04T12:55:00Z
4
value 0.00697
scoring_system epss
scoring_elements 0.71882
published_at 2026-04-07T12:55:00Z
5
value 0.00697
scoring_system epss
scoring_elements 0.71921
published_at 2026-04-13T12:55:00Z
6
value 0.00697
scoring_system epss
scoring_elements 0.71932
published_at 2026-04-09T12:55:00Z
7
value 0.00697
scoring_system epss
scoring_elements 0.71956
published_at 2026-04-11T12:55:00Z
8
value 0.00697
scoring_system epss
scoring_elements 0.71939
published_at 2026-04-12T12:55:00Z
9
value 0.00697
scoring_system epss
scoring_elements 0.71963
published_at 2026-04-16T12:55:00Z
10
value 0.00697
scoring_system epss
scoring_elements 0.71967
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4508
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265624
reference_id 1265624
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265624
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4508
reference_id CVE-2015-4508
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4508
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-103
reference_id mfsa2015-103
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-103
5
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4508
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmb8-vc5k-tbbc
15
url VCID-vs2t-gwzk-6ubt
vulnerability_id VCID-vs2t-gwzk-6ubt
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4517.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4517.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4517
reference_id
reference_type
scores
0
value 0.03205
scoring_system epss
scoring_elements 0.8703
published_at 2026-04-21T12:55:00Z
1
value 0.03205
scoring_system epss
scoring_elements 0.86961
published_at 2026-04-01T12:55:00Z
2
value 0.03205
scoring_system epss
scoring_elements 0.86972
published_at 2026-04-02T12:55:00Z
3
value 0.03205
scoring_system epss
scoring_elements 0.86991
published_at 2026-04-04T12:55:00Z
4
value 0.03205
scoring_system epss
scoring_elements 0.86984
published_at 2026-04-07T12:55:00Z
5
value 0.03205
scoring_system epss
scoring_elements 0.87004
published_at 2026-04-08T12:55:00Z
6
value 0.03205
scoring_system epss
scoring_elements 0.87011
published_at 2026-04-09T12:55:00Z
7
value 0.03205
scoring_system epss
scoring_elements 0.87025
published_at 2026-04-11T12:55:00Z
8
value 0.03205
scoring_system epss
scoring_elements 0.87019
published_at 2026-04-12T12:55:00Z
9
value 0.03205
scoring_system epss
scoring_elements 0.87013
published_at 2026-04-13T12:55:00Z
10
value 0.03205
scoring_system epss
scoring_elements 0.87029
published_at 2026-04-16T12:55:00Z
11
value 0.03205
scoring_system epss
scoring_elements 0.87033
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4517
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265784
reference_id 1265784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265784
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-112
reference_id mfsa2015-112
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-112
18
reference_url https://access.redhat.com/errata/RHSA-2015:1834
reference_id RHSA-2015:1834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1834
19
reference_url https://access.redhat.com/errata/RHSA-2015:1852
reference_id RHSA-2015:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1852
20
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
21
reference_url https://usn.ubuntu.com/2754-1/
reference_id USN-2754-1
reference_type
scores
url https://usn.ubuntu.com/2754-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4517
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vs2t-gwzk-6ubt
16
url VCID-xnzh-y88g-guhd
vulnerability_id VCID-xnzh-y88g-guhd
summary
Mozilla developer Jeff Walden reported that in Gecko's implementation
of ECMAScript 5 API's enforces non-configurable properties with logic specific to each API.
Scripts that do not go through these APIs can bypass these protections and make changes to
the immutable properties in violation of security protections. This could potentially
allow for web content to run in a privileged context leading to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4516.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4516.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4516
reference_id
reference_type
scores
0
value 0.01352
scoring_system epss
scoring_elements 0.80133
published_at 2026-04-21T12:55:00Z
1
value 0.01352
scoring_system epss
scoring_elements 0.80053
published_at 2026-04-01T12:55:00Z
2
value 0.01352
scoring_system epss
scoring_elements 0.80061
published_at 2026-04-02T12:55:00Z
3
value 0.01352
scoring_system epss
scoring_elements 0.80082
published_at 2026-04-04T12:55:00Z
4
value 0.01352
scoring_system epss
scoring_elements 0.8007
published_at 2026-04-07T12:55:00Z
5
value 0.01352
scoring_system epss
scoring_elements 0.80098
published_at 2026-04-08T12:55:00Z
6
value 0.01352
scoring_system epss
scoring_elements 0.80106
published_at 2026-04-09T12:55:00Z
7
value 0.01352
scoring_system epss
scoring_elements 0.80125
published_at 2026-04-11T12:55:00Z
8
value 0.01352
scoring_system epss
scoring_elements 0.80109
published_at 2026-04-12T12:55:00Z
9
value 0.01352
scoring_system epss
scoring_elements 0.80101
published_at 2026-04-13T12:55:00Z
10
value 0.01352
scoring_system epss
scoring_elements 0.8013
published_at 2026-04-16T12:55:00Z
11
value 0.01352
scoring_system epss
scoring_elements 0.80131
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4516
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265775
reference_id 1265775
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4516
reference_id CVE-2015-4516
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4516
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-109
reference_id mfsa2015-109
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-109
5
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4516
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xnzh-y88g-guhd
17
url VCID-y4jx-5cgd-kbbp
vulnerability_id VCID-y4jx-5cgd-kbbp
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4520.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4520.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4520
reference_id
reference_type
scores
0
value 0.00592
scoring_system epss
scoring_elements 0.69257
published_at 2026-04-21T12:55:00Z
1
value 0.00592
scoring_system epss
scoring_elements 0.69164
published_at 2026-04-01T12:55:00Z
2
value 0.00592
scoring_system epss
scoring_elements 0.6918
published_at 2026-04-02T12:55:00Z
3
value 0.00592
scoring_system epss
scoring_elements 0.692
published_at 2026-04-04T12:55:00Z
4
value 0.00592
scoring_system epss
scoring_elements 0.69182
published_at 2026-04-07T12:55:00Z
5
value 0.00592
scoring_system epss
scoring_elements 0.69232
published_at 2026-04-08T12:55:00Z
6
value 0.00592
scoring_system epss
scoring_elements 0.6925
published_at 2026-04-09T12:55:00Z
7
value 0.00592
scoring_system epss
scoring_elements 0.69272
published_at 2026-04-11T12:55:00Z
8
value 0.00592
scoring_system epss
scoring_elements 0.69258
published_at 2026-04-12T12:55:00Z
9
value 0.00592
scoring_system epss
scoring_elements 0.69229
published_at 2026-04-13T12:55:00Z
10
value 0.00592
scoring_system epss
scoring_elements 0.69268
published_at 2026-04-16T12:55:00Z
11
value 0.00592
scoring_system epss
scoring_elements 0.69277
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4520
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265781
reference_id 1265781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265781
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-111
reference_id mfsa2015-111
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-111
18
reference_url https://access.redhat.com/errata/RHSA-2015:1834
reference_id RHSA-2015:1834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1834
19
reference_url https://access.redhat.com/errata/RHSA-2015:1852
reference_id RHSA-2015:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1852
20
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
21
reference_url https://usn.ubuntu.com/2754-1/
reference_id USN-2754-1
reference_type
scores
url https://usn.ubuntu.com/2754-1/
fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
aliases CVE-2015-4520
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y4jx-5cgd-kbbp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0