Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/86816?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/86816?format=api", "purl": "pkg:mozilla/Thunderbird@38.3.0", "type": "mozilla", "namespace": "", "name": "Thunderbird", "version": "38.3.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "38.4.0", "latest_non_vulnerable_version": "150.0.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60744?format=api", "vulnerability_id": "VCID-7rmg-2u67-kqf3", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4509.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4509.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89655", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89591", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89594", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89607", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89608", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89625", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.8963", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89637", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89635", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89629", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89644", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.89646", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04937", "scoring_system": "epss", "scoring_elements": "0.8964", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265192", "reference_id": "1265192", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265192" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-106", "reference_id": "mfsa2015-106", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1852", "reference_id": "RHSA-2015:1852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1852" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86816?format=api", "purl": "pkg:mozilla/Thunderbird@38.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.3.0" } ], "aliases": [ "CVE-2015-4509" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7rmg-2u67-kqf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60740?format=api", "vulnerability_id": "VCID-88kb-em1q-77gc", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4500.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4500.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86979", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86891", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86901", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.8692", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86913", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86933", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86941", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86955", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.8695", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86944", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86959", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86963", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03173", "scoring_system": "epss", "scoring_elements": "0.86961", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265186", "reference_id": "1265186", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265186" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-96", "reference_id": "mfsa2015-96", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-96" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1852", "reference_id": "RHSA-2015:1852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1852" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86816?format=api", "purl": "pkg:mozilla/Thunderbird@38.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.3.0" } ], "aliases": [ "CVE-2015-4500" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88kb-em1q-77gc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63743?format=api", "vulnerability_id": "VCID-ecr4-p51g-bygd", "summary": "Security researcher Holger Fuhrmannek reported that when the\nMozilla updater is run, the updater can be manipulated to load the updated files from a\nworking directory under user control in concert with junctions. When the updates are run\nby the Mozilla Maintenance Service on Windows, these malicious files can be run with\nelevated privileges and be used to replace arbitrary files on the system. This could allow\nfor arbitrary code execution by a malicious user with local system access but does not\nallow for exploitation by web content.\nThis issue is specific to Windows and does not affect Linux or OS X\nsystems.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4505.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4505.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4505", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28406", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28621", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28704", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28752", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28559", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28624", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28664", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28573", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28593", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28568", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28521", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4505" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265610", "reference_id": "1265610", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265610" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4505", "reference_id": "CVE-2015-4505", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4505" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-100", "reference_id": "mfsa2015-100", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-100" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86816?format=api", "purl": "pkg:mozilla/Thunderbird@38.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.3.0" } ], "aliases": [ "CVE-2015-4505" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ecr4-p51g-bygd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60746?format=api", "vulnerability_id": "VCID-qeyy-sqj3-3kfp", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4511.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4511.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88392", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88309", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88317", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88331", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88336", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88355", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88362", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88372", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88364", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88379", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88376", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265630", "reference_id": "1265630", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265630" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-105", "reference_id": "mfsa2015-105", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86816?format=api", "purl": "pkg:mozilla/Thunderbird@38.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.3.0" } ], "aliases": [ "CVE-2015-4511" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qeyy-sqj3-3kfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60742?format=api", "vulnerability_id": "VCID-qjuf-f8ec-byc7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4506.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4506.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92084", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92045", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92051", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92058", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92075", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92078", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92082", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92089", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07974", "scoring_system": "epss", "scoring_elements": "0.92086", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265617", "reference_id": "1265617", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265617" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-101", "reference_id": "mfsa2015-101", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86816?format=api", "purl": "pkg:mozilla/Thunderbird@38.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.3.0" } ], "aliases": [ "CVE-2015-4506" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qjuf-f8ec-byc7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60750?format=api", "vulnerability_id": "VCID-sz8x-vmck-6yc5", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4519.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4519.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.6304", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62954", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62983", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62999", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63015", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63033", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63019", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62996", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63041", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265778", "reference_id": "1265778", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265778" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-110", "reference_id": "mfsa2015-110", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1852", "reference_id": "RHSA-2015:1852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1852" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86816?format=api", "purl": "pkg:mozilla/Thunderbird@38.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.3.0" } ], "aliases": [ "CVE-2015-4519" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sz8x-vmck-6yc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63716?format=api", "vulnerability_id": "VCID-t7wm-9sa4-2yff", "summary": "Security researcher Ronald Crane reported two issues in the libGLES\nportions of the ANGLE graphics library, used for WebGL and OpenGL content on Windows\nsystems. The first of these is a missing bounds check leading to memory safety errors when\nmanipulating shaders which could result in the writing to unowned memory. The second issue\nalso affects shaders when insufficient memory is allocated for a shader attribute array,\nleading to a buffer overflow. Both of these issues can lead to a potentially exploitable\ncrash.\nThese issues are specific to Windows and does not affect Linux or OS X\nsystems.\nIn general this flaw cannot be exploited through email in the\nThunderbird product because scripting is disabled, but is potentially a risk in\nbrowser or browser-like contexts.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7178.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7178.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7178", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.8133", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81207", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81215", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81239", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81238", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81265", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81271", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81291", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81278", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.8127", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81307", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81309", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81308", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7178" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265201", "reference_id": "1265201", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7178", "reference_id": "CVE-2015-7178", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7178" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-113", "reference_id": "mfsa2015-113", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-113" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86816?format=api", "purl": "pkg:mozilla/Thunderbird@38.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.3.0" } ], "aliases": [ "CVE-2015-7178" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t7wm-9sa4-2yff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60749?format=api", "vulnerability_id": "VCID-vs2t-gwzk-6ubt", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4517.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4517.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.8705", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.86961", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.86972", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.86991", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.86984", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87004", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87011", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87025", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87013", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87029", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.87033", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03205", "scoring_system": "epss", "scoring_elements": "0.8703", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265784", "reference_id": "1265784", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265784" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-112", "reference_id": "mfsa2015-112", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1852", "reference_id": "RHSA-2015:1852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1852" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86816?format=api", "purl": "pkg:mozilla/Thunderbird@38.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.3.0" } ], "aliases": [ "CVE-2015-4517" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vs2t-gwzk-6ubt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60751?format=api", "vulnerability_id": "VCID-y4jx-5cgd-kbbp", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4520.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4520.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69308", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69164", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.6918", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.692", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69182", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.6925", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69272", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69258", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69229", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69268", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69277", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00592", "scoring_system": "epss", "scoring_elements": "0.69257", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265781", "reference_id": "1265781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265781" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-111", "reference_id": "mfsa2015-111", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1834", "reference_id": "RHSA-2015:1834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1852", "reference_id": "RHSA-2015:1852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1852" }, { "reference_url": "https://usn.ubuntu.com/2743-1/", "reference_id": "USN-2743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2743-1/" }, { "reference_url": "https://usn.ubuntu.com/2754-1/", "reference_id": "USN-2754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86816?format=api", "purl": "pkg:mozilla/Thunderbird@38.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.3.0" } ], "aliases": [ "CVE-2015-4520" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y4jx-5cgd-kbbp" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.3.0" }