Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-9p7y-4cfe-ffag
Summary
Security researcher Spandan Veggalam reported a crash while using the
debugger API with SavedStacks in JavaScript. This crash can only occurs when the debugger is in use but may be potentially exploitable.
Aliases
0
alias CVE-2015-4507
Fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
1
url pkg:mozilla/Firefox%20OS@2.5.0
purl pkg:mozilla/Firefox%20OS@2.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0
2
url pkg:mozilla/SeaMonkey@2.38.0
purl pkg:mozilla/SeaMonkey@2.38.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4507.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4507.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4507
reference_id
reference_type
scores
0
value 0.01202
scoring_system epss
scoring_elements 0.78953
published_at 2026-04-16T12:55:00Z
1
value 0.01202
scoring_system epss
scoring_elements 0.78878
published_at 2026-04-01T12:55:00Z
2
value 0.01202
scoring_system epss
scoring_elements 0.78884
published_at 2026-04-02T12:55:00Z
3
value 0.01202
scoring_system epss
scoring_elements 0.78913
published_at 2026-04-04T12:55:00Z
4
value 0.01202
scoring_system epss
scoring_elements 0.78894
published_at 2026-04-07T12:55:00Z
5
value 0.01202
scoring_system epss
scoring_elements 0.78919
published_at 2026-04-08T12:55:00Z
6
value 0.01202
scoring_system epss
scoring_elements 0.78925
published_at 2026-04-13T12:55:00Z
7
value 0.01202
scoring_system epss
scoring_elements 0.78949
published_at 2026-04-11T12:55:00Z
8
value 0.01202
scoring_system epss
scoring_elements 0.78934
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4507
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265621
reference_id 1265621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265621
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507
reference_id CVE-2015-4507
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-102
reference_id mfsa2015-102
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-102
5
reference_url https://usn.ubuntu.com/2743-1/
reference_id USN-2743-1
reference_type
scores
url https://usn.ubuntu.com/2743-1/
Weaknesses
0
cwe_id 120
name Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
description The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Exploits
Severity_range_scorenull
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-9p7y-4cfe-ffag