Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/nss@2:3.14.3-1?distro=trixie
Typedeb
Namespacedebian
Namenss
Version2:3.14.3-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2:3.15.2-1
Latest_non_vulnerable_version2:3.123-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-b1m6-r1bv-d7gr
vulnerability_id VCID-b1m6-r1bv-d7gr
summary
Multiple vulnerabilities have been found in PolarSSL, the worst of
    which might allow a remote attacker to cause a Denial of Service condition.
references
0
reference_url http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-2-1-6-2-2-6-2-3-7-for-openjdk-7-released/
reference_id
reference_type
scores
url http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-2-1-6-2-2-6-2-3-7-for-openjdk-7-released/
1
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00020.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
10
reference_url http://marc.info/?l=bugtraq&m=136396549913849&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136396549913849&w=2
11
reference_url http://marc.info/?l=bugtraq&m=136432043316835&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136432043316835&w=2
12
reference_url http://marc.info/?l=bugtraq&m=136439120408139&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136439120408139&w=2
13
reference_url http://marc.info/?l=bugtraq&m=136733161405818&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136733161405818&w=2
14
reference_url http://marc.info/?l=bugtraq&m=137545771702053&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=137545771702053&w=2
15
reference_url http://openwall.com/lists/oss-security/2013/02/05/24
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2013/02/05/24
16
reference_url http://rhn.redhat.com/errata/RHSA-2013-0587.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0587.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2013-0782.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0782.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2013-0783.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0783.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2013-0833.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0833.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2013-1455.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1455.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2013-1456.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1456.html
22
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0169.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0169.json
23
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0169
reference_id
reference_type
scores
0
value 0.00773
scoring_system epss
scoring_elements 0.73526
published_at 2026-04-01T12:55:00Z
1
value 0.00773
scoring_system epss
scoring_elements 0.73534
published_at 2026-04-02T12:55:00Z
2
value 0.00773
scoring_system epss
scoring_elements 0.73557
published_at 2026-04-04T12:55:00Z
3
value 0.00773
scoring_system epss
scoring_elements 0.73528
published_at 2026-04-07T12:55:00Z
4
value 0.00773
scoring_system epss
scoring_elements 0.73565
published_at 2026-04-08T12:55:00Z
5
value 0.00773
scoring_system epss
scoring_elements 0.73578
published_at 2026-04-09T12:55:00Z
6
value 0.00928
scoring_system epss
scoring_elements 0.76077
published_at 2026-04-12T12:55:00Z
7
value 0.00928
scoring_system epss
scoring_elements 0.76101
published_at 2026-04-11T12:55:00Z
8
value 0.00928
scoring_system epss
scoring_elements 0.76119
published_at 2026-04-18T12:55:00Z
9
value 0.00928
scoring_system epss
scoring_elements 0.76103
published_at 2026-04-21T12:55:00Z
10
value 0.00928
scoring_system epss
scoring_elements 0.76075
published_at 2026-04-13T12:55:00Z
11
value 0.00928
scoring_system epss
scoring_elements 0.76115
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0169
24
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
26
reference_url http://secunia.com/advisories/53623
reference_id
reference_type
scores
url http://secunia.com/advisories/53623
27
reference_url http://secunia.com/advisories/55108
reference_id
reference_type
scores
url http://secunia.com/advisories/55108
28
reference_url http://secunia.com/advisories/55139
reference_id
reference_type
scores
url http://secunia.com/advisories/55139
29
reference_url http://secunia.com/advisories/55322
reference_id
reference_type
scores
url http://secunia.com/advisories/55322
30
reference_url http://secunia.com/advisories/55350
reference_id
reference_type
scores
url http://secunia.com/advisories/55350
31
reference_url http://secunia.com/advisories/55351
reference_id
reference_type
scores
url http://secunia.com/advisories/55351
32
reference_url http://security.gentoo.org/glsa/glsa-201406-32.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201406-32.xml
33
reference_url https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html
34
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18841
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18841
35
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19016
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19016
36
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19424
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19424
37
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19540
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19540
38
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19608
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19608
39
reference_url https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released
reference_id
reference_type
scores
url https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released
40
reference_url https://puppet.com/security/cve/cve-2013-0169
reference_id
reference_type
scores
url https://puppet.com/security/cve/cve-2013-0169
41
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03883001
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03883001
42
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
43
reference_url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0084
reference_id
reference_type
scores
url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0084
44
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
45
reference_url http://www.debian.org/security/2013/dsa-2621
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2621
46
reference_url http://www.debian.org/security/2013/dsa-2622
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2622
47
reference_url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
reference_id
reference_type
scores
url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
48
reference_url http://www.kb.cert.org/vuls/id/737740
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/737740
49
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
50
reference_url http://www.matrixssl.org/news.html
reference_id
reference_type
scores
url http://www.matrixssl.org/news.html
51
reference_url http://www.openssl.org/news/secadv_20130204.txt
reference_id
reference_type
scores
url http://www.openssl.org/news/secadv_20130204.txt
52
reference_url http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html
53
reference_url http://www.securityfocus.com/bid/57778
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57778
54
reference_url http://www.securitytracker.com/id/1029190
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1029190
55
reference_url http://www.splunk.com/view/SP-CAAAHXG
reference_id
reference_type
scores
url http://www.splunk.com/view/SP-CAAAHXG
56
reference_url http://www.ubuntu.com/usn/USN-1735-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1735-1
57
reference_url http://www.us-cert.gov/cas/techalerts/TA13-051A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA13-051A.html
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699885
reference_id 699885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699885
59
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699888
reference_id 699888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699888
60
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699889
reference_id 699889
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699889
61
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=907589
reference_id 907589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=907589
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0169
reference_id CVE-2013-0169
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0169
133
reference_url https://security.gentoo.org/glsa/201310-10
reference_id GLSA-201310-10
reference_type
scores
url https://security.gentoo.org/glsa/201310-10
134
reference_url https://security.gentoo.org/glsa/201312-03
reference_id GLSA-201312-03
reference_type
scores
url https://security.gentoo.org/glsa/201312-03
135
reference_url https://security.gentoo.org/glsa/201401-30
reference_id GLSA-201401-30
reference_type
scores
url https://security.gentoo.org/glsa/201401-30
136
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
137
reference_url https://access.redhat.com/errata/RHSA-2013:0273
reference_id RHSA-2013:0273
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0273
138
reference_url https://access.redhat.com/errata/RHSA-2013:0274
reference_id RHSA-2013:0274
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0274
139
reference_url https://access.redhat.com/errata/RHSA-2013:0275
reference_id RHSA-2013:0275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0275
140
reference_url https://access.redhat.com/errata/RHSA-2013:0531
reference_id RHSA-2013:0531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0531
141
reference_url https://access.redhat.com/errata/RHSA-2013:0532
reference_id RHSA-2013:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0532
142
reference_url https://access.redhat.com/errata/RHSA-2013:0587
reference_id RHSA-2013:0587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0587
143
reference_url https://access.redhat.com/errata/RHSA-2013:0636
reference_id RHSA-2013:0636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0636
144
reference_url https://access.redhat.com/errata/RHSA-2013:0782
reference_id RHSA-2013:0782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0782
145
reference_url https://access.redhat.com/errata/RHSA-2013:0783
reference_id RHSA-2013:0783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0783
146
reference_url https://access.redhat.com/errata/RHSA-2013:0822
reference_id RHSA-2013:0822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0822
147
reference_url https://access.redhat.com/errata/RHSA-2013:0823
reference_id RHSA-2013:0823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0823
148
reference_url https://access.redhat.com/errata/RHSA-2013:0833
reference_id RHSA-2013:0833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0833
149
reference_url https://access.redhat.com/errata/RHSA-2013:0855
reference_id RHSA-2013:0855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0855
150
reference_url https://access.redhat.com/errata/RHSA-2013:1013
reference_id RHSA-2013:1013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1013
151
reference_url https://access.redhat.com/errata/RHSA-2013:1455
reference_id RHSA-2013:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1455
152
reference_url https://access.redhat.com/errata/RHSA-2013:1456
reference_id RHSA-2013:1456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1456
153
reference_url https://access.redhat.com/errata/RHSA-2014:0416
reference_id RHSA-2014:0416
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0416
154
reference_url https://access.redhat.com/errata/RHSA-2020:4298
reference_id RHSA-2020:4298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4298
155
reference_url https://usn.ubuntu.com/1732-1/
reference_id USN-1732-1
reference_type
scores
url https://usn.ubuntu.com/1732-1/
156
reference_url https://usn.ubuntu.com/1732-3/
reference_id USN-1732-3
reference_type
scores
url https://usn.ubuntu.com/1732-3/
157
reference_url https://usn.ubuntu.com/1735-1/
reference_id USN-1735-1
reference_type
scores
url https://usn.ubuntu.com/1735-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.3-1?distro=trixie
purl pkg:deb/debian/nss@2:3.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2013-0169
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b1m6-r1bv-d7gr
1
url VCID-tqc3-eb8c-q3f9
vulnerability_id VCID-tqc3-eb8c-q3f9
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html
3
reference_url http://openwall.com/lists/oss-security/2013/02/05/24
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2013/02/05/24
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-1135.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1135.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-1144.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1144.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1620.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1620.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1620
reference_id
reference_type
scores
0
value 0.00808
scoring_system epss
scoring_elements 0.7424
published_at 2026-04-21T12:55:00Z
1
value 0.00808
scoring_system epss
scoring_elements 0.74152
published_at 2026-04-01T12:55:00Z
2
value 0.00808
scoring_system epss
scoring_elements 0.74158
published_at 2026-04-02T12:55:00Z
3
value 0.00808
scoring_system epss
scoring_elements 0.74184
published_at 2026-04-04T12:55:00Z
4
value 0.00808
scoring_system epss
scoring_elements 0.74157
published_at 2026-04-07T12:55:00Z
5
value 0.00808
scoring_system epss
scoring_elements 0.7419
published_at 2026-04-08T12:55:00Z
6
value 0.00808
scoring_system epss
scoring_elements 0.74205
published_at 2026-04-09T12:55:00Z
7
value 0.00808
scoring_system epss
scoring_elements 0.74226
published_at 2026-04-11T12:55:00Z
8
value 0.00808
scoring_system epss
scoring_elements 0.74208
published_at 2026-04-12T12:55:00Z
9
value 0.00808
scoring_system epss
scoring_elements 0.74201
published_at 2026-04-13T12:55:00Z
10
value 0.00808
scoring_system epss
scoring_elements 0.74238
published_at 2026-04-16T12:55:00Z
11
value 0.00808
scoring_system epss
scoring_elements 0.74248
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1620
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1620
9
reference_url http://seclists.org/fulldisclosure/2014/Dec/23
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Dec/23
10
reference_url http://security.gentoo.org/glsa/glsa-201406-19.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201406-19.xml
11
reference_url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
reference_id
reference_type
scores
url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
12
reference_url http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
13
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
14
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
15
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
16
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
17
reference_url http://www.securityfocus.com/archive/1/534161/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/534161/100/0/threaded
18
reference_url http://www.securityfocus.com/bid/57777
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57777
19
reference_url http://www.securityfocus.com/bid/64758
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/64758
20
reference_url http://www.ubuntu.com/usn/USN-1763-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1763-1
21
reference_url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699888
reference_id 699888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699888
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=908234
reference_id 908234
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=908234
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:11.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_communications_server:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:glassfish_communications_server:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_communications_server:2.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_server:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:6.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:opensso:3.0-03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:opensso:3.0-03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:opensso:3.0-03:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:traffic_director:11.1.1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.6.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*
reference_id cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1620
reference_id CVE-2013-1620
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-1620
50
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
51
reference_url https://access.redhat.com/errata/RHSA-2013:1135
reference_id RHSA-2013:1135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1135
52
reference_url https://access.redhat.com/errata/RHSA-2013:1144
reference_id RHSA-2013:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1144
53
reference_url https://access.redhat.com/errata/RHSA-2013:1181
reference_id RHSA-2013:1181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1181
54
reference_url https://usn.ubuntu.com/1763-1/
reference_id USN-1763-1
reference_type
scores
url https://usn.ubuntu.com/1763-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.3-1?distro=trixie
purl pkg:deb/debian/nss@2:3.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2013-1620
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tqc3-eb8c-q3f9
2
url VCID-yazh-n5vb-pkf1
vulnerability_id VCID-yazh-n5vb-pkf1
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, and SeaMonkey, some of which may allow a remote user to
    execute arbitrary code.
references
0
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-1135.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1135.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-1144.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1144.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0791.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0791.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0791
reference_id
reference_type
scores
0
value 0.02065
scoring_system epss
scoring_elements 0.83954
published_at 2026-04-21T12:55:00Z
1
value 0.02065
scoring_system epss
scoring_elements 0.83859
published_at 2026-04-01T12:55:00Z
2
value 0.02065
scoring_system epss
scoring_elements 0.83927
published_at 2026-04-13T12:55:00Z
3
value 0.02065
scoring_system epss
scoring_elements 0.83952
published_at 2026-04-18T12:55:00Z
4
value 0.02065
scoring_system epss
scoring_elements 0.83873
published_at 2026-04-02T12:55:00Z
5
value 0.02065
scoring_system epss
scoring_elements 0.83889
published_at 2026-04-04T12:55:00Z
6
value 0.02065
scoring_system epss
scoring_elements 0.8389
published_at 2026-04-07T12:55:00Z
7
value 0.02065
scoring_system epss
scoring_elements 0.83914
published_at 2026-04-08T12:55:00Z
8
value 0.02065
scoring_system epss
scoring_elements 0.8392
published_at 2026-04-09T12:55:00Z
9
value 0.02065
scoring_system epss
scoring_elements 0.83937
published_at 2026-04-11T12:55:00Z
10
value 0.02065
scoring_system epss
scoring_elements 0.83931
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0791
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=629816
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=629816
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17150
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17150
11
reference_url http://www.mozilla.org/security/announce/2013/mfsa2013-40.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2013/mfsa2013-40.html
12
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
13
reference_url http://www.securityfocus.com/bid/58826
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58826
14
reference_url http://www.ubuntu.com/usn/USN-1791-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1791-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=946947
reference_id 946947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=946947
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*
reference_id cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791
reference_id CVE-2013-0791
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0791
reference_id CVE-2013-0791
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0791
36
reference_url https://security.gentoo.org/glsa/201309-23
reference_id GLSA-201309-23
reference_type
scores
url https://security.gentoo.org/glsa/201309-23
37
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-40
reference_id mfsa2013-40
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-40
38
reference_url https://access.redhat.com/errata/RHSA-2013:1135
reference_id RHSA-2013:1135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1135
39
reference_url https://access.redhat.com/errata/RHSA-2013:1144
reference_id RHSA-2013:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1144
40
reference_url https://access.redhat.com/errata/RHSA-2013:1181
reference_id RHSA-2013:1181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1181
41
reference_url https://usn.ubuntu.com/1786-1/
reference_id USN-1786-1
reference_type
scores
url https://usn.ubuntu.com/1786-1/
42
reference_url https://usn.ubuntu.com/1791-1/
reference_id USN-1791-1
reference_type
scores
url https://usn.ubuntu.com/1791-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.3-1?distro=trixie
purl pkg:deb/debian/nss@2:3.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-7jt2-zr49-7ye5
3
vulnerability VCID-fxjm-ywug-f3d5
4
vulnerability VCID-gret-hn3p-5kbk
5
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/nss@2:3.110-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.110-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/nss@2:3.121-1?distro=trixie
purl pkg:deb/debian/nss@2:3.121-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jt2-zr49-7ye5
1
vulnerability VCID-fxjm-ywug-f3d5
2
vulnerability VCID-hk2m-rbdy-nqhc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.121-1%3Fdistro=trixie
5
url pkg:deb/debian/nss@2:3.123-1?distro=trixie
purl pkg:deb/debian/nss@2:3.123-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.123-1%3Fdistro=trixie
aliases CVE-2013-0791
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yazh-n5vb-pkf1
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.3-1%3Fdistro=trixie