Lookup for vulnerable packages by Package URL.

GET /api/packages/86820?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
    "purl": "pkg:mozilla/Firefox@38.0.0",
    "type": "mozilla",
    "namespace": "",
    "name": "Firefox",
    "version": "38.0.0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "39.0.0",
    "latest_non_vulnerable_version": "149.0.2",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51644?format=api",
            "vulnerability_id": "VCID-4yw5-k3au-33gf",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27779",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2787",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27924",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27757",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27824",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27866",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27872",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27772",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2714",
                    "reference_id": "CVE-2015-2714",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2714"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-52",
                    "reference_id": "mfsa2015-52",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-52"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2015-2714"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4yw5-k3au-33gf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51641?format=api",
            "vulnerability_id": "VCID-51hn-ab8w-c7bn",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82595",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8249",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82504",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82522",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82519",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82545",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82552",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82571",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82564",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82558",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220605",
                    "reference_id": "1220605",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220605"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-51",
                    "reference_id": "mfsa2015-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-51"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988",
                    "reference_id": "RHSA-2015:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0988"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1012",
                    "reference_id": "RHSA-2015:1012",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1012"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2603-1/",
                    "reference_id": "USN-2603-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2603-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2015-2713"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-51hn-ab8w-c7bn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51649?format=api",
            "vulnerability_id": "VCID-55t4-7jnq-j7fx",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90342",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90283",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90286",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90299",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90318",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90325",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90333",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90332",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90326",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2716"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220607",
                    "reference_id": "1220607",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220607"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-54",
                    "reference_id": "mfsa2015-54",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-54"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988",
                    "reference_id": "RHSA-2015:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0988"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1012",
                    "reference_id": "RHSA-2015:1012",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1012"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1011",
                    "reference_id": "RHSA-2020:1011",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1011"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2508",
                    "reference_id": "RHSA-2020:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2508"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2603-1/",
                    "reference_id": "USN-2603-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2603-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2015-2716"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55t4-7jnq-j7fx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51632?format=api",
            "vulnerability_id": "VCID-5ead-13an-2kcs",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2711.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2711.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66829",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66723",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66761",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66787",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66758",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66807",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66822",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66842",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66828",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66796",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2711"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220603",
                    "reference_id": "1220603",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2711",
                    "reference_id": "CVE-2015-2711",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2711"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-49",
                    "reference_id": "mfsa2015-49",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-49"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2015-2711"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ead-13an-2kcs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51651?format=api",
            "vulnerability_id": "VCID-89pc-vcy3-tkd7",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30757",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30739",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30865",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30911",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30731",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30789",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30821",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30822",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30778",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30733",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2718"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220609",
                    "reference_id": "1220609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718",
                    "reference_id": "CVE-2015-2718",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-56",
                    "reference_id": "mfsa2015-56",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-56"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2015-2718"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-89pc-vcy3-tkd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63740?format=api",
            "vulnerability_id": "VCID-et32-whyj-dyev",
            "summary": "Security researcher Joshua Drake  reported potential integer overflows  in the libstagefright library while processing video sample metadata in MPEG4 video files.   This can lead to a potentially exploitable crash.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4496.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4496.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4496",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81249",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81149",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81158",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81182",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81181",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81208",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81214",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81234",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8122",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81213",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4496"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1253550",
                    "reference_id": "1253550",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1253550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4496",
                    "reference_id": "CVE-2015-4496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4496"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-93",
                    "reference_id": "mfsa2015-93",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-93"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988",
                    "reference_id": "RHSA-2015:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0988"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2015-4496"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-et32-whyj-dyev"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51628?format=api",
            "vulnerability_id": "VCID-ghtc-dh9g-2ufb",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79962",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79885",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79892",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79913",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79901",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79929",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79938",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79958",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79941",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79934",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220597",
                    "reference_id": "1220597",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220597"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-46",
                    "reference_id": "mfsa2015-46",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-46"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988",
                    "reference_id": "RHSA-2015:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0988"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1012",
                    "reference_id": "RHSA-2015:1012",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1012"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2603-1/",
                    "reference_id": "USN-2603-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2603-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2015-2708"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ghtc-dh9g-2ufb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51635?format=api",
            "vulnerability_id": "VCID-jtxv-vhm6-33h3",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2712.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2712.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88255",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88182",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8819",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88206",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88212",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88232",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88238",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88242",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88241",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2712"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220604",
                    "reference_id": "1220604",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220604"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2712",
                    "reference_id": "CVE-2015-2712",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2712"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-50",
                    "reference_id": "mfsa2015-50",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-50"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2015-2712"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jtxv-vhm6-33h3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51648?format=api",
            "vulnerability_id": "VCID-nav6-hsaf-2fbj",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80306",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80224",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80232",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80252",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8024",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80297",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80282",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80275",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2715"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220606",
                    "reference_id": "1220606",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715",
                    "reference_id": "CVE-2015-2715",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-53",
                    "reference_id": "mfsa2015-53",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-53"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2015-2715"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nav6-hsaf-2fbj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49155?format=api",
            "vulnerability_id": "VCID-pcxu-acuh-m3be",
            "summary": "A buffer overflow in GStreamer could allow remote attackers to\n    execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0797.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0797.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91877",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91816",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91825",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91831",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91839",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91852",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91858",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91861",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91862",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220600",
                    "reference_id": "1220600",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220600"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-07",
                    "reference_id": "GLSA-201512-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-07"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-47",
                    "reference_id": "mfsa2015-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988",
                    "reference_id": "RHSA-2015:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0988"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2015-0797"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pcxu-acuh-m3be"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54341?format=api",
            "vulnerability_id": "VCID-qynw-zxy1-qqfh",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63053",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63089",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63075",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63011",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63041",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63005",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63056",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63072",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-57",
                    "reference_id": "mfsa2015-57",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-57"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2011-3079"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qynw-zxy1-qqfh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51650?format=api",
            "vulnerability_id": "VCID-r7v8-qp3e-cua2",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85151",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85058",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85071",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85088",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85093",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85114",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85121",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85136",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85133",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8513",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2717"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220608",
                    "reference_id": "1220608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717",
                    "reference_id": "CVE-2015-2717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-55",
                    "reference_id": "mfsa2015-55",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-55"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2015-2717"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7v8-qp3e-cua2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61306?format=api",
            "vulnerability_id": "VCID-xqqq-rk53-ubhp",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16083",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16216",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16149",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1608",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16264",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16325",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16123",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16208",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16275",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16256",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0833"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833",
                    "reference_id": "CVE-2015-0833",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-12",
                    "reference_id": "mfsa2015-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-12"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-58",
                    "reference_id": "mfsa2015-58",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-58"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86800?format=api",
                    "purl": "pkg:mozilla/Firefox@36.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2015-0833"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqqq-rk53-ubhp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51631?format=api",
            "vulnerability_id": "VCID-xx39-5rg1-b3am",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85151",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85058",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85071",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85088",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85092",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85114",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85121",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85135",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85133",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8513",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220601",
                    "reference_id": "1220601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220601"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-48",
                    "reference_id": "mfsa2015-48",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-48"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988",
                    "reference_id": "RHSA-2015:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0988"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1012",
                    "reference_id": "RHSA-2015:1012",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1012"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2603-1/",
                    "reference_id": "USN-2603-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2603-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86820?format=api",
                    "purl": "pkg:mozilla/Firefox@38.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
                }
            ],
            "aliases": [
                "CVE-2015-2710"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xx39-5rg1-b3am"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"
}