Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-2rn3-ydxb-5ugu
Summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
Aliases
0
alias CVE-2015-4477
Fixed_packages
0
url pkg:ebuild/dev-libs/nspr@4.12
purl pkg:ebuild/dev-libs/nspr@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nspr@4.12
1
url pkg:ebuild/dev-libs/nss@3.22.2
purl pkg:ebuild/dev-libs/nss@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@3.22.2
2
url pkg:ebuild/dev-libs/nss@4.12
purl pkg:ebuild/dev-libs/nss@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/nss@4.12
3
url pkg:ebuild/mail-client/thunderbird@3.22.2
purl pkg:ebuild/mail-client/thunderbird@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@3.22.2
4
url pkg:ebuild/mail-client/thunderbird@4.12
purl pkg:ebuild/mail-client/thunderbird@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@4.12
5
url pkg:ebuild/mail-client/thunderbird@38.7.0
purl pkg:ebuild/mail-client/thunderbird@38.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@38.7.0
6
url pkg:ebuild/mail-client/thunderbird-bin@3.22.2
purl pkg:ebuild/mail-client/thunderbird-bin@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@3.22.2
7
url pkg:ebuild/mail-client/thunderbird-bin@4.12
purl pkg:ebuild/mail-client/thunderbird-bin@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@4.12
8
url pkg:ebuild/mail-client/thunderbird-bin@38.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.7.0
9
url pkg:ebuild/www-client/firefox@3.22.2
purl pkg:ebuild/www-client/firefox@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@3.22.2
10
url pkg:ebuild/www-client/firefox@4.12
purl pkg:ebuild/www-client/firefox@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@4.12
11
url pkg:ebuild/www-client/firefox@38.7.0
purl pkg:ebuild/www-client/firefox@38.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@38.7.0
12
url pkg:ebuild/www-client/firefox-bin@3.22.2
purl pkg:ebuild/www-client/firefox-bin@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@3.22.2
13
url pkg:ebuild/www-client/firefox-bin@4.12
purl pkg:ebuild/www-client/firefox-bin@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@4.12
14
url pkg:ebuild/www-client/firefox-bin@38.7.0
purl pkg:ebuild/www-client/firefox-bin@38.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@38.7.0
15
url pkg:mozilla/Firefox@40.0.0
purl pkg:mozilla/Firefox@40.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@40.0.0
16
url pkg:mozilla/Firefox%20ESR@38.7.0
purl pkg:mozilla/Firefox%20ESR@38.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520ESR@38.7.0
17
url pkg:mozilla/Firefox%20OS@2.5.0
purl pkg:mozilla/Firefox%20OS@2.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0
18
url pkg:mozilla/SeaMonkey@2.38.0
purl pkg:mozilla/SeaMonkey@2.38.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4477.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4477.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4477
reference_id
reference_type
scores
0
value 0.0291
scoring_system epss
scoring_elements 0.86386
published_at 2026-04-16T12:55:00Z
1
value 0.0291
scoring_system epss
scoring_elements 0.86306
published_at 2026-04-01T12:55:00Z
2
value 0.0291
scoring_system epss
scoring_elements 0.86316
published_at 2026-04-02T12:55:00Z
3
value 0.0291
scoring_system epss
scoring_elements 0.86335
published_at 2026-04-04T12:55:00Z
4
value 0.0291
scoring_system epss
scoring_elements 0.86336
published_at 2026-04-07T12:55:00Z
5
value 0.0291
scoring_system epss
scoring_elements 0.86354
published_at 2026-04-08T12:55:00Z
6
value 0.0291
scoring_system epss
scoring_elements 0.86363
published_at 2026-04-09T12:55:00Z
7
value 0.0291
scoring_system epss
scoring_elements 0.86377
published_at 2026-04-11T12:55:00Z
8
value 0.0291
scoring_system epss
scoring_elements 0.86375
published_at 2026-04-12T12:55:00Z
9
value 0.0291
scoring_system epss
scoring_elements 0.86369
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4477
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252277
reference_id 1252277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252277
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4477
reference_id CVE-2015-4477
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4477
4
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-81
reference_id mfsa2015-81
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-81
6
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
Weaknesses
0
cwe_id 416
name Use After Free
description Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Exploits
Severity_range_score9.0 - 10.0
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-2rn3-ydxb-5ugu