Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-bbsb-t7kv-4bbw
Summary
Mozilla developers and community members reported several memory safety bugs in the
browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed
evidence of memory corruption under certain circumstances, and we presume that with enough
effort at least some of these could be exploited to run arbitrary code.
Aliases
0
alias CVE-2016-2815
Fixed_packages
0
url pkg:deb/debian/firefox@47.0-1?distro=sid
purl pkg:deb/debian/firefox@47.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@47.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox-esr@0?distro=trixie
purl pkg:deb/debian/firefox-esr@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie
5
url pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie
purl pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2fqb-r5zb-a7dp
1
vulnerability VCID-3kv6-c148-nkhq
2
vulnerability VCID-59d3-343b-e3aw
3
vulnerability VCID-5dw5-vpt8-zqbz
4
vulnerability VCID-61r1-arbe-dke4
5
vulnerability VCID-7jt2-zr49-7ye5
6
vulnerability VCID-95et-ezmb-buau
7
vulnerability VCID-9ag7-z86d-nba9
8
vulnerability VCID-9nbw-7c9e-13af
9
vulnerability VCID-av7u-3g4m-mugm
10
vulnerability VCID-bwth-uepr-z7a3
11
vulnerability VCID-cjsm-7gxr-8ygw
12
vulnerability VCID-d16s-p141-qbft
13
vulnerability VCID-fxjm-ywug-f3d5
14
vulnerability VCID-hk2m-rbdy-nqhc
15
vulnerability VCID-ma29-qa7e-9qb4
16
vulnerability VCID-nge1-4cvg-zqb2
17
vulnerability VCID-nyum-jpbc-abew
18
vulnerability VCID-p6yz-xs58-u3gm
19
vulnerability VCID-pfmd-zv8f-8bfc
20
vulnerability VCID-q689-wneh-hbdq
21
vulnerability VCID-q8qp-5szp-mfe8
22
vulnerability VCID-qbzp-euvv-q7c7
23
vulnerability VCID-ruqn-mk9t-57hb
24
vulnerability VCID-tv7r-qf2c-dqbm
25
vulnerability VCID-w98r-yagc-kkec
26
vulnerability VCID-z6tm-b352-5uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie
6
url pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie
purl pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f81v-9fv8-93cd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie
7
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f81v-9fv8-93cd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie
8
url pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-f81v-9fv8-93cd
3
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie
9
url pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2fqb-r5zb-a7dp
1
vulnerability VCID-3kv6-c148-nkhq
2
vulnerability VCID-59d3-343b-e3aw
3
vulnerability VCID-61r1-arbe-dke4
4
vulnerability VCID-7jt2-zr49-7ye5
5
vulnerability VCID-95et-ezmb-buau
6
vulnerability VCID-9nbw-7c9e-13af
7
vulnerability VCID-av7u-3g4m-mugm
8
vulnerability VCID-bwth-uepr-z7a3
9
vulnerability VCID-cjsm-7gxr-8ygw
10
vulnerability VCID-d16s-p141-qbft
11
vulnerability VCID-f81v-9fv8-93cd
12
vulnerability VCID-fxjm-ywug-f3d5
13
vulnerability VCID-hk2m-rbdy-nqhc
14
vulnerability VCID-ma29-qa7e-9qb4
15
vulnerability VCID-nge1-4cvg-zqb2
16
vulnerability VCID-nyum-jpbc-abew
17
vulnerability VCID-p6yz-xs58-u3gm
18
vulnerability VCID-pfmd-zv8f-8bfc
19
vulnerability VCID-q689-wneh-hbdq
20
vulnerability VCID-q8qp-5szp-mfe8
21
vulnerability VCID-ruqn-mk9t-57hb
22
vulnerability VCID-tv7r-qf2c-dqbm
23
vulnerability VCID-w98r-yagc-kkec
24
vulnerability VCID-z6tm-b352-5uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie
10
url pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f81v-9fv8-93cd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie
Affected_packages
References
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2815.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2815.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2815
reference_id
reference_type
scores
0
value 0.00362
scoring_system epss
scoring_elements 0.58288
published_at 2026-04-24T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.58199
published_at 2026-04-01T12:55:00Z
2
value 0.00362
scoring_system epss
scoring_elements 0.58313
published_at 2026-04-13T12:55:00Z
3
value 0.00362
scoring_system epss
scoring_elements 0.58346
published_at 2026-04-16T12:55:00Z
4
value 0.00362
scoring_system epss
scoring_elements 0.58349
published_at 2026-04-18T12:55:00Z
5
value 0.00362
scoring_system epss
scoring_elements 0.58326
published_at 2026-04-21T12:55:00Z
6
value 0.00362
scoring_system epss
scoring_elements 0.58284
published_at 2026-04-02T12:55:00Z
7
value 0.00362
scoring_system epss
scoring_elements 0.58305
published_at 2026-04-04T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58279
published_at 2026-04-07T12:55:00Z
9
value 0.00362
scoring_system epss
scoring_elements 0.58332
published_at 2026-04-08T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58338
published_at 2026-04-09T12:55:00Z
11
value 0.00362
scoring_system epss
scoring_elements 0.58356
published_at 2026-04-11T12:55:00Z
12
value 0.00362
scoring_system epss
scoring_elements 0.58333
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2815
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1241896
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1241896
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1242798
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1242798
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1243466
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1243466
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1245743
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1245743
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1264300
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1264300
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1271037
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1271037
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-49.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-49.html
16
reference_url http://www.securityfocus.com/bid/91075
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91075
17
reference_url http://www.securitytracker.com/id/1036057
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036057
18
reference_url http://www.ubuntu.com/usn/USN-2993-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2993-1
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1342890
reference_id 1342890
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1342890
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2815
reference_id CVE-2016-2815
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2815
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2815
reference_id CVE-2016-2815
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2815
36
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-49
reference_id mfsa2016-49
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-49
37
reference_url https://usn.ubuntu.com/2993-1/
reference_id USN-2993-1
reference_type
scores
url https://usn.ubuntu.com/2993-1/
Weaknesses
0
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Exploits
Severity_range_score6.8 - 10.0
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-bbsb-t7kv-4bbw