Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-wkfm-csjp-v7bx
Summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
Aliases
0
alias CVE-2013-2566
Fixed_packages
0
url pkg:ebuild/dev-libs/nspr@2.33.1
purl pkg:ebuild/dev-libs/nspr@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nspr@2.33.1
1
url pkg:ebuild/dev-libs/nspr@4.10.6
purl pkg:ebuild/dev-libs/nspr@4.10.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nspr@4.10.6
2
url pkg:ebuild/dev-libs/nspr@31.5.0
purl pkg:ebuild/dev-libs/nspr@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nspr@31.5.0
3
url pkg:ebuild/dev-libs/nspr@31.5.3
purl pkg:ebuild/dev-libs/nspr@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nspr@31.5.3
4
url pkg:ebuild/dev-libs/nss@3.15.3
purl pkg:ebuild/dev-libs/nss@3.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.15.3
5
url pkg:ebuild/mail-client/thunderbird@31.5.0
purl pkg:ebuild/mail-client/thunderbird@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@31.5.0
6
url pkg:ebuild/mail-client/thunderbird@31.5.3
purl pkg:ebuild/mail-client/thunderbird@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@31.5.3
7
url pkg:ebuild/mail-client/thunderbird-bin@31.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@31.5.0
8
url pkg:ebuild/mail-client/thunderbird-bin@31.5.3
purl pkg:ebuild/mail-client/thunderbird-bin@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@31.5.3
9
url pkg:ebuild/www-client/firefox@31.5.3
purl pkg:ebuild/www-client/firefox@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@31.5.3
10
url pkg:ebuild/www-client/firefox-bin@31.5.3
purl pkg:ebuild/www-client/firefox-bin@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@31.5.3
11
url pkg:ebuild/www-client/seamonkey@2.33.1
purl pkg:ebuild/www-client/seamonkey@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1
12
url pkg:ebuild/www-client/seamonkey@31.5.0
purl pkg:ebuild/www-client/seamonkey@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0
13
url pkg:ebuild/www-client/seamonkey@31.5.3
purl pkg:ebuild/www-client/seamonkey@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3
14
url pkg:ebuild/www-client/seamonkey-bin@2.33.1
purl pkg:ebuild/www-client/seamonkey-bin@2.33.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.33.1
15
url pkg:ebuild/www-client/seamonkey-bin@31.5.0
purl pkg:ebuild/www-client/seamonkey-bin@31.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.0
16
url pkg:ebuild/www-client/seamonkey-bin@31.5.3
purl pkg:ebuild/www-client/seamonkey-bin@31.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@31.5.3
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2566.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2566.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2566
reference_id
reference_type
scores
0
value 0.90757
scoring_system epss
scoring_elements 0.99622
published_at 2026-04-01T12:55:00Z
1
value 0.90757
scoring_system epss
scoring_elements 0.99621
published_at 2026-04-02T12:55:00Z
2
value 0.90757
scoring_system epss
scoring_elements 0.99623
published_at 2026-04-04T12:55:00Z
3
value 0.90757
scoring_system epss
scoring_elements 0.99624
published_at 2026-04-11T12:55:00Z
4
value 0.90757
scoring_system epss
scoring_elements 0.99625
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2566
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=921947
reference_id 921947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=921947
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566
reference_id CVE-2013-2566
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566
4
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
5
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
reference_id mfsa2013-103
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
7
reference_url https://usn.ubuntu.com/2031-1/
reference_id USN-2031-1
reference_type
scores
url https://usn.ubuntu.com/2031-1/
8
reference_url https://usn.ubuntu.com/2032-1/
reference_id USN-2032-1
reference_type
scores
url https://usn.ubuntu.com/2032-1/
Weaknesses
Exploits
0
date_added null
description
Check if a server supports a given version of SSL/TLS and cipher suites.

        The certificate is stored in loot, and any known vulnerabilities against that
        SSL version and cipher suite combination are checked. These checks include
        POODLE, deprecated protocols, expired/not valid certs, low key strength, null cipher suites,
        certificates signed with MD5, DROWN, RC4 ciphers, exportable ciphers, LOGJAM, and BEAST.
required_action null
due_date null
notes
{}
known_ransomware_campaign_use false
source_date_published 2014-10-14
exploit_type null
platform
source_date_updated null
data_source Metasploit
source_url https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/scanner/ssl/ssl_version.rb
Severity_range_score9.0 - 10.0
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-wkfm-csjp-v7bx