Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/nss@2:3.17.2-1.1
Typedeb
Namespacedebian
Namenss
Version2:3.17.2-1.1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2:3.87.1-1+deb12u2
Latest_non_vulnerable_version2:3.87.1-1+deb12u2
Affected_by_vulnerabilities
0
url VCID-2w58-mdmk-guh8
vulnerability_id VCID-2w58-mdmk-guh8
summary
Mozilla has updated the version of Network Security Services
(NSS) library used in Firefox to NSS 3.23. This addresses four moderate rated
networking security issues reported by Mozilla engineers Tyson Smith and
Jed Davis.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-2779.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2779.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2834.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2834.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2834
reference_id
reference_type
scores
0
value 0.00399
scoring_system epss
scoring_elements 0.60642
published_at 2026-04-13T12:55:00Z
1
value 0.00399
scoring_system epss
scoring_elements 0.60515
published_at 2026-04-01T12:55:00Z
2
value 0.00399
scoring_system epss
scoring_elements 0.60638
published_at 2026-04-08T12:55:00Z
3
value 0.00399
scoring_system epss
scoring_elements 0.60653
published_at 2026-04-09T12:55:00Z
4
value 0.00399
scoring_system epss
scoring_elements 0.60678
published_at 2026-04-11T12:55:00Z
5
value 0.00399
scoring_system epss
scoring_elements 0.60663
published_at 2026-04-12T12:55:00Z
6
value 0.00399
scoring_system epss
scoring_elements 0.6059
published_at 2026-04-02T12:55:00Z
7
value 0.00399
scoring_system epss
scoring_elements 0.60619
published_at 2026-04-04T12:55:00Z
8
value 0.00399
scoring_system epss
scoring_elements 0.60589
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2834
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1206283
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1206283
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1221620
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1221620
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1241034
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1241034
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1241037
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1241037
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
15
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
18
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-61.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-61.html
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
21
reference_url http://www.securityfocus.com/bid/91072
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91072
22
reference_url http://www.securitytracker.com/id/1036057
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036057
23
reference_url http://www.ubuntu.com/usn/USN-2993-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2993-1
24
reference_url http://www.ubuntu.com/usn/USN-3029-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3029-1
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1347908
reference_id 1347908
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1347908
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834
reference_id CVE-2016-2834
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2834
reference_id CVE-2016-2834
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2834
43
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-61
reference_id mfsa2016-61
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-61
44
reference_url https://access.redhat.com/errata/RHSA-2016:2779
reference_id RHSA-2016:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2779
45
reference_url https://usn.ubuntu.com/2993-1/
reference_id USN-2993-1
reference_type
scores
url https://usn.ubuntu.com/2993-1/
46
reference_url https://usn.ubuntu.com/3029-1/
reference_id USN-3029-1
reference_type
scores
url https://usn.ubuntu.com/3029-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2016-2834
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2w58-mdmk-guh8
1
url VCID-2w9f-avet-g7c5
vulnerability_id VCID-2w9f-avet-g7c5
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-1980.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1980.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-1981.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1981.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7181.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7181.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7181
reference_id
reference_type
scores
0
value 0.05021
scoring_system epss
scoring_elements 0.89731
published_at 2026-04-13T12:55:00Z
1
value 0.05021
scoring_system epss
scoring_elements 0.89689
published_at 2026-04-01T12:55:00Z
2
value 0.05021
scoring_system epss
scoring_elements 0.8974
published_at 2026-04-11T12:55:00Z
3
value 0.05021
scoring_system epss
scoring_elements 0.89738
published_at 2026-04-12T12:55:00Z
4
value 0.05021
scoring_system epss
scoring_elements 0.89692
published_at 2026-04-02T12:55:00Z
5
value 0.05021
scoring_system epss
scoring_elements 0.89706
published_at 2026-04-04T12:55:00Z
6
value 0.05021
scoring_system epss
scoring_elements 0.89709
published_at 2026-04-07T12:55:00Z
7
value 0.05021
scoring_system epss
scoring_elements 0.89726
published_at 2026-04-08T12:55:00Z
8
value 0.05021
scoring_system epss
scoring_elements 0.89733
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7181
12
reference_url https://bto.bluecoat.com/security-advisory/sa119
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa119
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1192028
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1192028
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
34
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
35
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
36
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
37
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
38
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
39
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
40
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
41
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
43
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
44
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
45
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
46
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
47
reference_url http://www.securityfocus.com/bid/77416
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77416
48
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
49
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
50
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
51
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
52
reference_url http://www.ubuntu.com/usn/USN-2791-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2791-1
53
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1269345
reference_id 1269345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1269345
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7181
reference_id CVE-2015-7181
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7181
67
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
68
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
69
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
reference_id mfsa2015-133
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
70
reference_url https://access.redhat.com/errata/RHSA-2015:1980
reference_id RHSA-2015:1980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1980
71
reference_url https://access.redhat.com/errata/RHSA-2015:1981
reference_id RHSA-2015:1981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1981
72
reference_url https://access.redhat.com/errata/RHSA-2015:2068
reference_id RHSA-2015:2068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2068
73
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
74
reference_url https://usn.ubuntu.com/2791-1/
reference_id USN-2791-1
reference_type
scores
url https://usn.ubuntu.com/2791-1/
75
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2015-7181
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2w9f-avet-g7c5
2
url VCID-2zrv-q4tb-wqeg
vulnerability_id VCID-2zrv-q4tb-wqeg
summary
The NSS code used for checking PKCS#1 v1.5 was leaking information useful in mounting Bleichenbacher-like attacks.
Both the overall correctness of the padding as well as the length of the encrypted message was leaking through timing side-channel.
By sending large number of attacker-selected ciphertexts, the attacker would be able to decrypt a previously intercepted PKCS#1 v1.5 ciphertext (for example, to decrypt a TLS session that used RSA key exchange), or forge a signature using the victim's key.
The issue was fixed by implementing the implicit rejection algorithm, in which the NSS returns a deterministic random message in case invalid padding is detected, as proposed in the Marvin Attack paper.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4421.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4421
reference_id
reference_type
scores
0
value 0.00224
scoring_system epss
scoring_elements 0.4514
published_at 2026-04-13T12:55:00Z
1
value 0.00224
scoring_system epss
scoring_elements 0.45171
published_at 2026-04-11T12:55:00Z
2
value 0.00224
scoring_system epss
scoring_elements 0.45138
published_at 2026-04-12T12:55:00Z
3
value 0.00224
scoring_system epss
scoring_elements 0.45132
published_at 2026-04-02T12:55:00Z
4
value 0.00224
scoring_system epss
scoring_elements 0.45154
published_at 2026-04-04T12:55:00Z
5
value 0.00224
scoring_system epss
scoring_elements 0.45096
published_at 2026-04-07T12:55:00Z
6
value 0.00224
scoring_system epss
scoring_elements 0.45149
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4421
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238677
reference_id 2238677
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238677
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-53
reference_id mfsa2023-53
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-53
6
reference_url https://usn.ubuntu.com/6727-1/
reference_id USN-6727-1
reference_type
scores
url https://usn.ubuntu.com/6727-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2023-4421
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2zrv-q4tb-wqeg
3
url VCID-46cy-x3cp-tke5
vulnerability_id VCID-46cy-x3cp-tke5
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0743.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0743
reference_id
reference_type
scores
0
value 0.00926
scoring_system epss
scoring_elements 0.76033
published_at 2026-04-13T12:55:00Z
1
value 0.00926
scoring_system epss
scoring_elements 0.75979
published_at 2026-04-02T12:55:00Z
2
value 0.00926
scoring_system epss
scoring_elements 0.76039
published_at 2026-04-12T12:55:00Z
3
value 0.00926
scoring_system epss
scoring_elements 0.76062
published_at 2026-04-11T12:55:00Z
4
value 0.00926
scoring_system epss
scoring_elements 0.76037
published_at 2026-04-09T12:55:00Z
5
value 0.00926
scoring_system epss
scoring_elements 0.76023
published_at 2026-04-08T12:55:00Z
6
value 0.00926
scoring_system epss
scoring_elements 0.7599
published_at 2026-04-07T12:55:00Z
7
value 0.00926
scoring_system epss
scoring_elements 0.76011
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2260012
reference_id 2260012
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2260012
14
reference_url https://security.gentoo.org/glsa/202402-26
reference_id GLSA-202402-26
reference_type
scores
url https://security.gentoo.org/glsa/202402-26
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
reference_id mfsa2024-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-01/
reference_id mfsa2024-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://www.mozilla.org/security/advisories/mfsa2024-01/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
20
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
23
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
24
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
25
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
26
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
27
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
28
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
29
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
30
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
31
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
32
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
33
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
34
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
35
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
36
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
37
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
38
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
39
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
40
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
41
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
42
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1867408
reference_id show_bug.cgi?id=1867408
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1867408
43
reference_url https://usn.ubuntu.com/6610-1/
reference_id USN-6610-1
reference_type
scores
url https://usn.ubuntu.com/6610-1/
44
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-gret-hn3p-5kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1
aliases CVE-2024-0743
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-46cy-x3cp-tke5
4
url VCID-5wqt-2dtu-8qa4
vulnerability_id VCID-5wqt-2dtu-8qa4
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
1
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
2
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
3
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2016-0495.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0495.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1950.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1950.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1950
reference_id
reference_type
scores
0
value 0.01867
scoring_system epss
scoring_elements 0.8308
published_at 2026-04-13T12:55:00Z
1
value 0.01867
scoring_system epss
scoring_elements 0.83014
published_at 2026-04-01T12:55:00Z
2
value 0.01867
scoring_system epss
scoring_elements 0.83067
published_at 2026-04-08T12:55:00Z
3
value 0.01867
scoring_system epss
scoring_elements 0.83074
published_at 2026-04-09T12:55:00Z
4
value 0.01867
scoring_system epss
scoring_elements 0.8309
published_at 2026-04-11T12:55:00Z
5
value 0.01867
scoring_system epss
scoring_elements 0.83084
published_at 2026-04-12T12:55:00Z
6
value 0.01867
scoring_system epss
scoring_elements 0.83031
published_at 2026-04-02T12:55:00Z
7
value 0.01867
scoring_system epss
scoring_elements 0.83044
published_at 2026-04-04T12:55:00Z
8
value 0.01867
scoring_system epss
scoring_elements 0.83042
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1950
14
reference_url https://bto.bluecoat.com/security-advisory/sa119
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa119
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1245528
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1245528
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1977
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2790
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2791
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2792
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2793
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2794
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2795
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2797
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2798
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2799
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2800
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2801
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2802
46
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.3_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.3_release_notes
47
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.1_release_notes
48
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
49
reference_url https://support.apple.com/HT206166
reference_id
reference_type
scores
url https://support.apple.com/HT206166
50
reference_url https://support.apple.com/HT206167
reference_id
reference_type
scores
url https://support.apple.com/HT206167
51
reference_url https://support.apple.com/HT206168
reference_id
reference_type
scores
url https://support.apple.com/HT206168
52
reference_url https://support.apple.com/HT206169
reference_id
reference_type
scores
url https://support.apple.com/HT206169
53
reference_url http://www.debian.org/security/2016/dsa-3510
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3510
54
reference_url http://www.debian.org/security/2016/dsa-3520
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3520
55
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
56
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-35.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-35.html
57
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
58
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
59
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
60
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
61
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
62
reference_url http://www.securityfocus.com/bid/84223
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84223
63
reference_url http://www.securitytracker.com/id/1035215
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035215
64
reference_url http://www.ubuntu.com/usn/USN-2917-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2917-1
65
reference_url http://www.ubuntu.com/usn/USN-2917-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2917-2
66
reference_url http://www.ubuntu.com/usn/USN-2917-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2917-3
67
reference_url http://www.ubuntu.com/usn/USN-2924-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2924-1
68
reference_url http://www.ubuntu.com/usn/USN-2934-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2934-1
69
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1310509
reference_id 1310509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1310509
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.19.2:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.21:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1950
reference_id CVE-2016-1950
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1950
101
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
102
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-35
reference_id mfsa2016-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-35
103
reference_url https://access.redhat.com/errata/RHSA-2016:0370
reference_id RHSA-2016:0370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0370
104
reference_url https://access.redhat.com/errata/RHSA-2016:0371
reference_id RHSA-2016:0371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0371
105
reference_url https://access.redhat.com/errata/RHSA-2016:0495
reference_id RHSA-2016:0495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0495
106
reference_url https://usn.ubuntu.com/2917-1/
reference_id USN-2917-1
reference_type
scores
url https://usn.ubuntu.com/2917-1/
107
reference_url https://usn.ubuntu.com/2924-1/
reference_id USN-2924-1
reference_type
scores
url https://usn.ubuntu.com/2924-1/
108
reference_url https://usn.ubuntu.com/2934-1/
reference_id USN-2934-1
reference_type
scores
url https://usn.ubuntu.com/2934-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2016-1950
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5wqt-2dtu-8qa4
5
url VCID-6fvj-phnx-kfgs
vulnerability_id VCID-6fvj-phnx-kfgs
summary After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17023.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17023.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17023
reference_id
reference_type
scores
0
value 0.00899
scoring_system epss
scoring_elements 0.75599
published_at 2026-04-01T12:55:00Z
1
value 0.00899
scoring_system epss
scoring_elements 0.75663
published_at 2026-04-12T12:55:00Z
2
value 0.00899
scoring_system epss
scoring_elements 0.75657
published_at 2026-04-13T12:55:00Z
3
value 0.00899
scoring_system epss
scoring_elements 0.75682
published_at 2026-04-11T12:55:00Z
4
value 0.00899
scoring_system epss
scoring_elements 0.75601
published_at 2026-04-02T12:55:00Z
5
value 0.00899
scoring_system epss
scoring_elements 0.75632
published_at 2026-04-04T12:55:00Z
6
value 0.00899
scoring_system epss
scoring_elements 0.75612
published_at 2026-04-07T12:55:00Z
7
value 0.00899
scoring_system epss
scoring_elements 0.75646
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17023
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1791225
reference_id 1791225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1791225
7
reference_url https://security.archlinux.org/ASA-202001-1
reference_id ASA-202001-1
reference_type
scores
url https://security.archlinux.org/ASA-202001-1
8
reference_url https://security.archlinux.org/AVG-1084
reference_id AVG-1084
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1084
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
reference_id mfsa2020-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
11
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
12
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
13
reference_url https://usn.ubuntu.com/4234-1/
reference_id USN-4234-1
reference_type
scores
url https://usn.ubuntu.com/4234-1/
14
reference_url https://usn.ubuntu.com/4397-1/
reference_id USN-4397-1
reference_type
scores
url https://usn.ubuntu.com/4397-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-17023
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fvj-phnx-kfgs
6
url VCID-7msj-wyd6-zkbe
vulnerability_id VCID-7msj-wyd6-zkbe
summary nss: Check length of inputs for cryptographic primitives
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17006.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17006.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17006
reference_id
reference_type
scores
0
value 0.03036
scoring_system epss
scoring_elements 0.86605
published_at 2026-04-01T12:55:00Z
1
value 0.03036
scoring_system epss
scoring_elements 0.86617
published_at 2026-04-02T12:55:00Z
2
value 0.03036
scoring_system epss
scoring_elements 0.86636
published_at 2026-04-04T12:55:00Z
3
value 0.03036
scoring_system epss
scoring_elements 0.86635
published_at 2026-04-07T12:55:00Z
4
value 0.03036
scoring_system epss
scoring_elements 0.86654
published_at 2026-04-08T12:55:00Z
5
value 0.03036
scoring_system epss
scoring_elements 0.86664
published_at 2026-04-09T12:55:00Z
6
value 0.03036
scoring_system epss
scoring_elements 0.86677
published_at 2026-04-11T12:55:00Z
7
value 0.03036
scoring_system epss
scoring_elements 0.86675
published_at 2026-04-12T12:55:00Z
8
value 0.03036
scoring_system epss
scoring_elements 0.86668
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17006
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1775916
reference_id 1775916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1775916
8
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
9
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
10
reference_url https://access.redhat.com/errata/RHSA-2021:0758
reference_id RHSA-2021:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0758
11
reference_url https://access.redhat.com/errata/RHSA-2021:0876
reference_id RHSA-2021:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0876
12
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
13
reference_url https://access.redhat.com/errata/RHSA-2021:1026
reference_id RHSA-2021:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1026
14
reference_url https://usn.ubuntu.com/4231-1/
reference_id USN-4231-1
reference_type
scores
url https://usn.ubuntu.com/4231-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-17006
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7msj-wyd6-zkbe
7
url VCID-8qtg-h4km-bfg2
vulnerability_id VCID-8qtg-h4km-bfg2
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11719.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11719.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11719
reference_id
reference_type
scores
0
value 0.00447
scoring_system epss
scoring_elements 0.6355
published_at 2026-04-11T12:55:00Z
1
value 0.00447
scoring_system epss
scoring_elements 0.63534
published_at 2026-04-12T12:55:00Z
2
value 0.00447
scoring_system epss
scoring_elements 0.63517
published_at 2026-04-08T12:55:00Z
3
value 0.00447
scoring_system epss
scoring_elements 0.63413
published_at 2026-04-01T12:55:00Z
4
value 0.00447
scoring_system epss
scoring_elements 0.63465
published_at 2026-04-07T12:55:00Z
5
value 0.00447
scoring_system epss
scoring_elements 0.63473
published_at 2026-04-02T12:55:00Z
6
value 0.00447
scoring_system epss
scoring_elements 0.635
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11719
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1728436
reference_id 1728436
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1728436
5
reference_url https://security.archlinux.org/ASA-201907-4
reference_id ASA-201907-4
reference_type
scores
url https://security.archlinux.org/ASA-201907-4
6
reference_url https://security.archlinux.org/AVG-1002
reference_id AVG-1002
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1002
7
reference_url https://security.gentoo.org/glsa/201908-12
reference_id GLSA-201908-12
reference_type
scores
url https://security.gentoo.org/glsa/201908-12
8
reference_url https://security.gentoo.org/glsa/201908-20
reference_id GLSA-201908-20
reference_type
scores
url https://security.gentoo.org/glsa/201908-20
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
reference_id mfsa2019-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
reference_id mfsa2019-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
reference_id mfsa2019-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
reference_id mfsa2019-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
13
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
14
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
15
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
16
reference_url https://usn.ubuntu.com/4054-1/
reference_id USN-4054-1
reference_type
scores
url https://usn.ubuntu.com/4054-1/
17
reference_url https://usn.ubuntu.com/4060-1/
reference_id USN-4060-1
reference_type
scores
url https://usn.ubuntu.com/4060-1/
18
reference_url https://usn.ubuntu.com/4060-2/
reference_id USN-4060-2
reference_type
scores
url https://usn.ubuntu.com/4060-2/
19
reference_url https://usn.ubuntu.com/4064-1/
reference_id USN-4064-1
reference_type
scores
url https://usn.ubuntu.com/4064-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-11719
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8qtg-h4km-bfg2
8
url VCID-9mux-fuyc-a7dx
vulnerability_id VCID-9mux-fuyc-a7dx
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1938.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1938.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1938
reference_id
reference_type
scores
0
value 0.01048
scoring_system epss
scoring_elements 0.77513
published_at 2026-04-13T12:55:00Z
1
value 0.01048
scoring_system epss
scoring_elements 0.77455
published_at 2026-04-01T12:55:00Z
2
value 0.01048
scoring_system epss
scoring_elements 0.77506
published_at 2026-04-09T12:55:00Z
3
value 0.01048
scoring_system epss
scoring_elements 0.77532
published_at 2026-04-11T12:55:00Z
4
value 0.01048
scoring_system epss
scoring_elements 0.77516
published_at 2026-04-12T12:55:00Z
5
value 0.01048
scoring_system epss
scoring_elements 0.77461
published_at 2026-04-02T12:55:00Z
6
value 0.01048
scoring_system epss
scoring_elements 0.77486
published_at 2026-04-04T12:55:00Z
7
value 0.01048
scoring_system epss
scoring_elements 0.77467
published_at 2026-04-07T12:55:00Z
8
value 0.01048
scoring_system epss
scoring_elements 0.77497
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1938
5
reference_url https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
reference_id
reference_type
scores
url https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
13
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
14
reference_url https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
reference_id
reference_type
scores
url https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
15
reference_url https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
reference_id
reference_type
scores
url https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
16
reference_url https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
reference_id
reference_type
scores
url https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
17
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
18
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
20
reference_url http://www.securityfocus.com/bid/81955
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81955
21
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
22
reference_url http://www.securitytracker.com/id/1034825
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034825
23
reference_url http://www.ubuntu.com/usn/USN-2880-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-1
24
reference_url http://www.ubuntu.com/usn/USN-2880-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2880-2
25
reference_url http://www.ubuntu.com/usn/USN-2903-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2903-1
26
reference_url http://www.ubuntu.com/usn/USN-2903-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2903-2
27
reference_url http://www.ubuntu.com/usn/USN-2973-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2973-1
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1305159
reference_id 1305159
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1305159
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938
reference_id CVE-2016-1938
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1938
reference_id CVE-2016-1938
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1938
36
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
37
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
38
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-07
reference_id mfsa2016-07
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-07
39
reference_url https://usn.ubuntu.com/2880-1/
reference_id USN-2880-1
reference_type
scores
url https://usn.ubuntu.com/2880-1/
40
reference_url https://usn.ubuntu.com/2903-1/
reference_id USN-2903-1
reference_type
scores
url https://usn.ubuntu.com/2903-1/
41
reference_url https://usn.ubuntu.com/2973-1/
reference_id USN-2973-1
reference_type
scores
url https://usn.ubuntu.com/2973-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2016-1938
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mux-fuyc-a7dx
9
url VCID-cgvg-aj53-kkbp
vulnerability_id VCID-cgvg-aj53-kkbp
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0767.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0767.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0767
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50523
published_at 2026-04-11T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.505
published_at 2026-04-12T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50477
published_at 2026-04-04T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50481
published_at 2026-04-09T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50484
published_at 2026-04-08T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.5043
published_at 2026-04-07T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50448
published_at 2026-04-02T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50485
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0767
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2170377
reference_id 2170377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2170377
24
reference_url https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
reference_id ALAS-2023-1992.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
25
reference_url https://security.gentoo.org/glsa/202305-35
reference_id GLSA-202305-35
reference_type
scores
url https://security.gentoo.org/glsa/202305-35
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-05
reference_id mfsa2023-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-05
27
reference_url https://www.mozilla.org/security/advisories/mfsa2023-05/
reference_id mfsa2023-05
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://www.mozilla.org/security/advisories/mfsa2023-05/
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-06
reference_id mfsa2023-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-06
29
reference_url https://www.mozilla.org/security/advisories/mfsa2023-06/
reference_id mfsa2023-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://www.mozilla.org/security/advisories/mfsa2023-06/
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-07
reference_id mfsa2023-07
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-07
31
reference_url https://www.mozilla.org/security/advisories/mfsa2023-07/
reference_id mfsa2023-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://www.mozilla.org/security/advisories/mfsa2023-07/
32
reference_url https://access.redhat.com/errata/RHSA-2023:1252
reference_id RHSA-2023:1252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1252
33
reference_url https://access.redhat.com/errata/RHSA-2023:1332
reference_id RHSA-2023:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1332
34
reference_url https://access.redhat.com/errata/RHSA-2023:1365
reference_id RHSA-2023:1365
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1365
35
reference_url https://access.redhat.com/errata/RHSA-2023:1366
reference_id RHSA-2023:1366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1366
36
reference_url https://access.redhat.com/errata/RHSA-2023:1368
reference_id RHSA-2023:1368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1368
37
reference_url https://access.redhat.com/errata/RHSA-2023:1369
reference_id RHSA-2023:1369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1369
38
reference_url https://access.redhat.com/errata/RHSA-2023:1370
reference_id RHSA-2023:1370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1370
39
reference_url https://access.redhat.com/errata/RHSA-2023:1406
reference_id RHSA-2023:1406
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1406
40
reference_url https://access.redhat.com/errata/RHSA-2023:1436
reference_id RHSA-2023:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1436
41
reference_url https://access.redhat.com/errata/RHSA-2023:1442
reference_id RHSA-2023:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1442
42
reference_url https://access.redhat.com/errata/RHSA-2023:1443
reference_id RHSA-2023:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1443
43
reference_url https://access.redhat.com/errata/RHSA-2023:1444
reference_id RHSA-2023:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1444
44
reference_url https://access.redhat.com/errata/RHSA-2023:1445
reference_id RHSA-2023:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1445
45
reference_url https://access.redhat.com/errata/RHSA-2023:1472
reference_id RHSA-2023:1472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1472
46
reference_url https://access.redhat.com/errata/RHSA-2023:1479
reference_id RHSA-2023:1479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1479
47
reference_url https://access.redhat.com/errata/RHSA-2023:1677
reference_id RHSA-2023:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1677
48
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
reference_id show_bug.cgi?id=1804640
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
49
reference_url https://usn.ubuntu.com/5880-1/
reference_id USN-5880-1
reference_type
scores
url https://usn.ubuntu.com/5880-1/
50
reference_url https://usn.ubuntu.com/5892-1/
reference_id USN-5892-1
reference_type
scores
url https://usn.ubuntu.com/5892-1/
51
reference_url https://usn.ubuntu.com/5892-2/
reference_id USN-5892-2
reference_type
scores
url https://usn.ubuntu.com/5892-2/
52
reference_url https://usn.ubuntu.com/5943-1/
reference_id USN-5943-1
reference_type
scores
url https://usn.ubuntu.com/5943-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2023-0767
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cgvg-aj53-kkbp
10
url VCID-dh3c-g3k3-zkb7
vulnerability_id VCID-dh3c-g3k3-zkb7
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7805.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7805
reference_id
reference_type
scores
0
value 0.03211
scoring_system epss
scoring_elements 0.8703
published_at 2026-04-13T12:55:00Z
1
value 0.03851
scoring_system epss
scoring_elements 0.88141
published_at 2026-04-01T12:55:00Z
2
value 0.03851
scoring_system epss
scoring_elements 0.88207
published_at 2026-04-11T12:55:00Z
3
value 0.03851
scoring_system epss
scoring_elements 0.88197
published_at 2026-04-09T12:55:00Z
4
value 0.03851
scoring_system epss
scoring_elements 0.88191
published_at 2026-04-08T12:55:00Z
5
value 0.03851
scoring_system epss
scoring_elements 0.88149
published_at 2026-04-02T12:55:00Z
6
value 0.03851
scoring_system epss
scoring_elements 0.88199
published_at 2026-04-12T12:55:00Z
7
value 0.03851
scoring_system epss
scoring_elements 0.88166
published_at 2026-04-04T12:55:00Z
8
value 0.03851
scoring_system epss
scoring_elements 0.88171
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7805
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
13
reference_url https://www.debian.org/security/2017/dsa-3987
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3987
14
reference_url https://www.debian.org/security/2017/dsa-3998
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3998
15
reference_url https://www.debian.org/security/2017/dsa-4014
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4014
16
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2017-22/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-22/
18
reference_url https://www.mozilla.org/security/advisories/mfsa2017-23/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-23/
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
20
reference_url http://www.securityfocus.com/bid/101059
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101059
21
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471171
reference_id 1471171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471171
23
reference_url https://security.archlinux.org/ASA-201710-19
reference_id ASA-201710-19
reference_type
scores
url https://security.archlinux.org/ASA-201710-19
24
reference_url https://security.archlinux.org/AVG-441
reference_id AVG-441
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-441
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7805
reference_id CVE-2017-7805
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7805
32
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
33
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
34
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
35
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
reference_id mfsa2017-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
36
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
reference_id mfsa2017-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
37
reference_url https://access.redhat.com/errata/RHSA-2017:2832
reference_id RHSA-2017:2832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2832
38
reference_url https://usn.ubuntu.com/3431-1/
reference_id USN-3431-1
reference_type
scores
url https://usn.ubuntu.com/3431-1/
39
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
40
reference_url https://usn.ubuntu.com/3436-1/
reference_id USN-3436-1
reference_type
scores
url https://usn.ubuntu.com/3436-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
1
url pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
purl pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ewe9-39b1-kba2
8
vulnerability VCID-fgv4-bz59-h7g7
9
vulnerability VCID-hs5f-21nx-gfeb
10
vulnerability VCID-jrsz-ynp7-wbb2
11
vulnerability VCID-jvrr-2gej-bfby
12
vulnerability VCID-k2s2-zkua-8ydy
13
vulnerability VCID-k4a4-f1as-x3bj
14
vulnerability VCID-mx8t-s47w-wud5
15
vulnerability VCID-paez-g9wh-mfeq
16
vulnerability VCID-rk7t-zjzg-eqar
17
vulnerability VCID-szzk-wxm2-cfgj
18
vulnerability VCID-vjas-pry4-93cz
19
vulnerability VCID-vszp-vyxy-f7g7
20
vulnerability VCID-vzb9-aeqz-hybr
21
vulnerability VCID-w794-gqex-83du
22
vulnerability VCID-wavp-f4kn-j3cm
23
vulnerability VCID-x1ty-wqph-gkak
24
vulnerability VCID-y43f-tmvr-hqas
25
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%252Bdeb9u1
2
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
aliases CVE-2017-7805
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dh3c-g3k3-zkb7
11
url VCID-dk4z-1j37-aucx
vulnerability_id VCID-dk4z-1j37-aucx
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0591.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0591.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0684.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0684.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0685.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0685.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1979.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1979.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1979
reference_id
reference_type
scores
0
value 0.00707
scoring_system epss
scoring_elements 0.72159
published_at 2026-04-13T12:55:00Z
1
value 0.00707
scoring_system epss
scoring_elements 0.72113
published_at 2026-04-01T12:55:00Z
2
value 0.00707
scoring_system epss
scoring_elements 0.72165
published_at 2026-04-09T12:55:00Z
3
value 0.00707
scoring_system epss
scoring_elements 0.72188
published_at 2026-04-11T12:55:00Z
4
value 0.00707
scoring_system epss
scoring_elements 0.72172
published_at 2026-04-12T12:55:00Z
5
value 0.00707
scoring_system epss
scoring_elements 0.72119
published_at 2026-04-02T12:55:00Z
6
value 0.00707
scoring_system epss
scoring_elements 0.72139
published_at 2026-04-04T12:55:00Z
7
value 0.00707
scoring_system epss
scoring_elements 0.72117
published_at 2026-04-07T12:55:00Z
8
value 0.00707
scoring_system epss
scoring_elements 0.72153
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1979
11
reference_url https://bto.bluecoat.com/security-advisory/sa124
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa124
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1185033
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1185033
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807
20
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.1_release_notes
21
reference_url http://www.debian.org/security/2016/dsa-3576
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3576
22
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
23
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-36.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-36.html
24
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
25
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
26
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
27
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
28
reference_url http://www.securityfocus.com/bid/84221
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84221
29
reference_url http://www.securitytracker.com/id/1035215
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035215
30
reference_url http://www.ubuntu.com/usn/USN-2973-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2973-1
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1315202
reference_id 1315202
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1315202
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979
reference_id CVE-2016-1979
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1979
reference_id CVE-2016-1979
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1979
36
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
37
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-36
reference_id mfsa2016-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-36
38
reference_url https://access.redhat.com/errata/RHSA-2016:0591
reference_id RHSA-2016:0591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0591
39
reference_url https://access.redhat.com/errata/RHSA-2016:0684
reference_id RHSA-2016:0684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0684
40
reference_url https://access.redhat.com/errata/RHSA-2016:0685
reference_id RHSA-2016:0685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0685
41
reference_url https://usn.ubuntu.com/2973-1/
reference_id USN-2973-1
reference_type
scores
url https://usn.ubuntu.com/2973-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2016-1979
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dk4z-1j37-aucx
12
url VCID-ekxy-vaed-u7cg
vulnerability_id VCID-ekxy-vaed-u7cg
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird the worst of which could lead to the execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9074.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9074
reference_id
reference_type
scores
0
value 0.01221
scoring_system epss
scoring_elements 0.79091
published_at 2026-04-13T12:55:00Z
1
value 0.01221
scoring_system epss
scoring_elements 0.79074
published_at 2026-04-04T12:55:00Z
2
value 0.01221
scoring_system epss
scoring_elements 0.79059
published_at 2026-04-07T12:55:00Z
3
value 0.01221
scoring_system epss
scoring_elements 0.79083
published_at 2026-04-08T12:55:00Z
4
value 0.01221
scoring_system epss
scoring_elements 0.7909
published_at 2026-04-09T12:55:00Z
5
value 0.01221
scoring_system epss
scoring_elements 0.79115
published_at 2026-04-11T12:55:00Z
6
value 0.01221
scoring_system epss
scoring_elements 0.79101
published_at 2026-04-12T12:55:00Z
7
value 0.01221
scoring_system epss
scoring_elements 0.79041
published_at 2026-04-01T12:55:00Z
8
value 0.01221
scoring_system epss
scoring_elements 0.79047
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9074
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://www.debian.org/security/2016/dsa-3730
reference_id
reference_type
scores
url https://www.debian.org/security/2016/dsa-3730
13
reference_url https://www.mozilla.org/security/advisories/mfsa2016-89/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2016-89/
14
reference_url https://www.mozilla.org/security/advisories/mfsa2016-90/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2016-90/
15
reference_url https://www.mozilla.org/security/advisories/mfsa2016-93/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2016-93/
16
reference_url http://www.securityfocus.com/bid/94341
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/94341
17
reference_url http://www.securitytracker.com/id/1037298
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037298
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1396548
reference_id 1396548
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1396548
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9074
reference_id CVE-2016-9074
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-9074
23
reference_url https://security.gentoo.org/glsa/201701-15
reference_id GLSA-201701-15
reference_type
scores
url https://security.gentoo.org/glsa/201701-15
24
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-89
reference_id mfsa2016-89
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-89
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-90
reference_id mfsa2016-90
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-90
27
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-93
reference_id mfsa2016-93
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-93
28
reference_url https://usn.ubuntu.com/3163-1/
reference_id USN-3163-1
reference_type
scores
url https://usn.ubuntu.com/3163-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
purl pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ewe9-39b1-kba2
8
vulnerability VCID-fgv4-bz59-h7g7
9
vulnerability VCID-hs5f-21nx-gfeb
10
vulnerability VCID-jrsz-ynp7-wbb2
11
vulnerability VCID-jvrr-2gej-bfby
12
vulnerability VCID-k2s2-zkua-8ydy
13
vulnerability VCID-k4a4-f1as-x3bj
14
vulnerability VCID-mx8t-s47w-wud5
15
vulnerability VCID-paez-g9wh-mfeq
16
vulnerability VCID-rk7t-zjzg-eqar
17
vulnerability VCID-szzk-wxm2-cfgj
18
vulnerability VCID-vjas-pry4-93cz
19
vulnerability VCID-vszp-vyxy-f7g7
20
vulnerability VCID-vzb9-aeqz-hybr
21
vulnerability VCID-w794-gqex-83du
22
vulnerability VCID-wavp-f4kn-j3cm
23
vulnerability VCID-x1ty-wqph-gkak
24
vulnerability VCID-y43f-tmvr-hqas
25
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%252Bdeb9u1
aliases CVE-2016-9074
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ekxy-vaed-u7cg
13
url VCID-ewe9-39b1-kba2
vulnerability_id VCID-ewe9-39b1-kba2
summary
A vulnerability in NSS might allow remote attackers to cause a
    Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25648
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27152
published_at 2026-04-01T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27192
published_at 2026-04-02T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27229
published_at 2026-04-04T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27022
published_at 2026-04-07T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27091
published_at 2026-04-08T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27137
published_at 2026-04-09T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27141
published_at 2026-04-11T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27097
published_at 2026-04-12T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.2704
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25648
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1887319
reference_id 1887319
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1887319
5
reference_url https://security.gentoo.org/glsa/202012-21
reference_id GLSA-202012-21
reference_type
scores
url https://security.gentoo.org/glsa/202012-21
6
reference_url https://access.redhat.com/errata/RHSA-2021:1384
reference_id RHSA-2021:1384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1384
7
reference_url https://access.redhat.com/errata/RHSA-2021:3572
reference_id RHSA-2021:3572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3572
8
reference_url https://usn.ubuntu.com/5410-1/
reference_id USN-5410-1
reference_type
scores
url https://usn.ubuntu.com/5410-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-25648
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ewe9-39b1-kba2
14
url VCID-fgv4-bz59-h7g7
vulnerability_id VCID-fgv4-bz59-h7g7
summary
Multiple vulnerabilities have been found in Mozilla Network
    Security Service (NSS), the worst of which may lead to arbitrary code
    execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18508.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18508.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18508
reference_id
reference_type
scores
0
value 0.00558
scoring_system epss
scoring_elements 0.68142
published_at 2026-04-01T12:55:00Z
1
value 0.00558
scoring_system epss
scoring_elements 0.68165
published_at 2026-04-02T12:55:00Z
2
value 0.00558
scoring_system epss
scoring_elements 0.68183
published_at 2026-04-04T12:55:00Z
3
value 0.00558
scoring_system epss
scoring_elements 0.68161
published_at 2026-04-07T12:55:00Z
4
value 0.00558
scoring_system epss
scoring_elements 0.68212
published_at 2026-04-08T12:55:00Z
5
value 0.00558
scoring_system epss
scoring_elements 0.68228
published_at 2026-04-09T12:55:00Z
6
value 0.00558
scoring_system epss
scoring_elements 0.68253
published_at 2026-04-11T12:55:00Z
7
value 0.00558
scoring_system epss
scoring_elements 0.6824
published_at 2026-04-12T12:55:00Z
8
value 0.00558
scoring_system epss
scoring_elements 0.68206
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1671310
reference_id 1671310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1671310
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921614
reference_id 921614
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921614
6
reference_url https://security.gentoo.org/glsa/202003-37
reference_id GLSA-202003-37
reference_type
scores
url https://security.gentoo.org/glsa/202003-37
7
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
8
reference_url https://usn.ubuntu.com/3898-1/
reference_id USN-3898-1
reference_type
scores
url https://usn.ubuntu.com/3898-1/
9
reference_url https://usn.ubuntu.com/3898-2/
reference_id USN-3898-2
reference_type
scores
url https://usn.ubuntu.com/3898-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
aliases CVE-2018-18508
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fgv4-bz59-h7g7
15
url VCID-gfj6-dsud-g3fh
vulnerability_id VCID-gfj6-dsud-g3fh
summary
Multiple vulnerabilities have been found in NSS, the worst of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5462.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5462
reference_id
reference_type
scores
0
value 0.01072
scoring_system epss
scoring_elements 0.77748
published_at 2026-04-13T12:55:00Z
1
value 0.01072
scoring_system epss
scoring_elements 0.77749
published_at 2026-04-12T12:55:00Z
2
value 0.01072
scoring_system epss
scoring_elements 0.77765
published_at 2026-04-11T12:55:00Z
3
value 0.01072
scoring_system epss
scoring_elements 0.77689
published_at 2026-04-01T12:55:00Z
4
value 0.01072
scoring_system epss
scoring_elements 0.77739
published_at 2026-04-09T12:55:00Z
5
value 0.01072
scoring_system epss
scoring_elements 0.77734
published_at 2026-04-08T12:55:00Z
6
value 0.01072
scoring_system epss
scoring_elements 0.77706
published_at 2026-04-07T12:55:00Z
7
value 0.01072
scoring_system epss
scoring_elements 0.77723
published_at 2026-04-04T12:55:00Z
8
value 0.01072
scoring_system epss
scoring_elements 0.77696
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5462
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1345089
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1345089
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
28
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
29
reference_url https://www.debian.org/security/2017/dsa-3831
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3831
30
reference_url https://www.debian.org/security/2017/dsa-3872
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3872
31
reference_url https://www.mozilla.org/security/advisories/mfsa2017-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-10/
32
reference_url https://www.mozilla.org/security/advisories/mfsa2017-11/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-11/
33
reference_url https://www.mozilla.org/security/advisories/mfsa2017-12/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-12/
34
reference_url https://www.mozilla.org/security/advisories/mfsa2017-13/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-13/
35
reference_url http://www.securityfocus.com/bid/97940
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97940
36
reference_url http://www.securitytracker.com/id/1038320
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038320
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443348
reference_id 1443348
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443348
38
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862958
reference_id 862958
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862958
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5462
reference_id CVE-2017-5462
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-5462
45
reference_url https://security.gentoo.org/glsa/201705-04
reference_id GLSA-201705-04
reference_type
scores
url https://security.gentoo.org/glsa/201705-04
46
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
47
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
reference_id mfsa2017-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
48
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11
reference_id mfsa2017-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11
49
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
reference_id mfsa2017-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
reference_id mfsa2017-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
51
reference_url https://usn.ubuntu.com/3260-1/
reference_id USN-3260-1
reference_type
scores
url https://usn.ubuntu.com/3260-1/
52
reference_url https://usn.ubuntu.com/3278-1/
reference_id USN-3278-1
reference_type
scores
url https://usn.ubuntu.com/3278-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
1
url pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
purl pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ewe9-39b1-kba2
8
vulnerability VCID-fgv4-bz59-h7g7
9
vulnerability VCID-hs5f-21nx-gfeb
10
vulnerability VCID-jrsz-ynp7-wbb2
11
vulnerability VCID-jvrr-2gej-bfby
12
vulnerability VCID-k2s2-zkua-8ydy
13
vulnerability VCID-k4a4-f1as-x3bj
14
vulnerability VCID-mx8t-s47w-wud5
15
vulnerability VCID-paez-g9wh-mfeq
16
vulnerability VCID-rk7t-zjzg-eqar
17
vulnerability VCID-szzk-wxm2-cfgj
18
vulnerability VCID-vjas-pry4-93cz
19
vulnerability VCID-vszp-vyxy-f7g7
20
vulnerability VCID-vzb9-aeqz-hybr
21
vulnerability VCID-w794-gqex-83du
22
vulnerability VCID-wavp-f4kn-j3cm
23
vulnerability VCID-x1ty-wqph-gkak
24
vulnerability VCID-y43f-tmvr-hqas
25
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%252Bdeb9u1
aliases CVE-2017-5462
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gfj6-dsud-g3fh
16
url VCID-hs5f-21nx-gfeb
vulnerability_id VCID-hs5f-21nx-gfeb
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11729.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11729.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11729
reference_id
reference_type
scores
0
value 0.0055
scoring_system epss
scoring_elements 0.67967
published_at 2026-04-13T12:55:00Z
1
value 0.0055
scoring_system epss
scoring_elements 0.67949
published_at 2026-04-04T12:55:00Z
2
value 0.0055
scoring_system epss
scoring_elements 0.67927
published_at 2026-04-07T12:55:00Z
3
value 0.0055
scoring_system epss
scoring_elements 0.67978
published_at 2026-04-08T12:55:00Z
4
value 0.0055
scoring_system epss
scoring_elements 0.67991
published_at 2026-04-09T12:55:00Z
5
value 0.0055
scoring_system epss
scoring_elements 0.68015
published_at 2026-04-11T12:55:00Z
6
value 0.0055
scoring_system epss
scoring_elements 0.68001
published_at 2026-04-12T12:55:00Z
7
value 0.0055
scoring_system epss
scoring_elements 0.67907
published_at 2026-04-01T12:55:00Z
8
value 0.0055
scoring_system epss
scoring_elements 0.6793
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11729
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1728437
reference_id 1728437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1728437
5
reference_url https://security.archlinux.org/ASA-201907-4
reference_id ASA-201907-4
reference_type
scores
url https://security.archlinux.org/ASA-201907-4
6
reference_url https://security.archlinux.org/AVG-1002
reference_id AVG-1002
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1002
7
reference_url https://security.gentoo.org/glsa/201908-12
reference_id GLSA-201908-12
reference_type
scores
url https://security.gentoo.org/glsa/201908-12
8
reference_url https://security.gentoo.org/glsa/201908-20
reference_id GLSA-201908-20
reference_type
scores
url https://security.gentoo.org/glsa/201908-20
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
reference_id mfsa2019-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
reference_id mfsa2019-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
reference_id mfsa2019-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
reference_id mfsa2019-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
13
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
14
reference_url https://access.redhat.com/errata/RHSA-2019:4190
reference_id RHSA-2019:4190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4190
15
reference_url https://usn.ubuntu.com/4054-1/
reference_id USN-4054-1
reference_type
scores
url https://usn.ubuntu.com/4054-1/
16
reference_url https://usn.ubuntu.com/4060-1/
reference_id USN-4060-1
reference_type
scores
url https://usn.ubuntu.com/4060-1/
17
reference_url https://usn.ubuntu.com/4060-2/
reference_id USN-4060-2
reference_type
scores
url https://usn.ubuntu.com/4060-2/
18
reference_url https://usn.ubuntu.com/4064-1/
reference_id USN-4064-1
reference_type
scores
url https://usn.ubuntu.com/4064-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-11729
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hs5f-21nx-gfeb
17
url VCID-hs79-pemh-vfd6
vulnerability_id VCID-hs79-pemh-vfd6
summary nss: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9574.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9574.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9574
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40051
published_at 2026-04-01T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40168
published_at 2026-04-13T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40212
published_at 2026-04-09T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40224
published_at 2026-04-11T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40187
published_at 2026-04-12T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.402
published_at 2026-04-02T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40225
published_at 2026-04-04T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40147
published_at 2026-04-07T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40201
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9574
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9574
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1404568
reference_id 1404568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1404568
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9574
reference_id CVE-2016-9574
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-9574
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2016-9574
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hs79-pemh-vfd6
18
url VCID-jmhk-12t1-kugh
vulnerability_id VCID-jmhk-12t1-kugh
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2730
reference_id
reference_type
scores
0
value 0.00228
scoring_system epss
scoring_elements 0.45533
published_at 2026-04-13T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.4544
published_at 2026-04-01T12:55:00Z
2
value 0.00228
scoring_system epss
scoring_elements 0.45514
published_at 2026-04-02T12:55:00Z
3
value 0.00228
scoring_system epss
scoring_elements 0.45536
published_at 2026-04-04T12:55:00Z
4
value 0.00228
scoring_system epss
scoring_elements 0.45482
published_at 2026-04-07T12:55:00Z
5
value 0.00228
scoring_system epss
scoring_elements 0.45537
published_at 2026-04-08T12:55:00Z
6
value 0.00228
scoring_system epss
scoring_elements 0.45538
published_at 2026-04-09T12:55:00Z
7
value 0.00228
scoring_system epss
scoring_elements 0.45558
published_at 2026-04-11T12:55:00Z
8
value 0.00228
scoring_system epss
scoring_elements 0.45527
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236954
reference_id 1236954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236954
5
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-64
reference_id mfsa2015-64
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-64
7
reference_url https://access.redhat.com/errata/RHSA-2015:1664
reference_id RHSA-2015:1664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1664
8
reference_url https://access.redhat.com/errata/RHSA-2015:1699
reference_id RHSA-2015:1699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1699
9
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
10
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
11
reference_url https://usn.ubuntu.com/2672-1/
reference_id USN-2672-1
reference_type
scores
url https://usn.ubuntu.com/2672-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2015-2730
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jmhk-12t1-kugh
19
url VCID-jrsz-ynp7-wbb2
vulnerability_id VCID-jrsz-ynp7-wbb2
summary Multiple vulnerabilities have been discovered in NSS, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43527
reference_id
reference_type
scores
0
value 0.05243
scoring_system epss
scoring_elements 0.89954
published_at 2026-04-07T12:55:00Z
1
value 0.05243
scoring_system epss
scoring_elements 0.89971
published_at 2026-04-08T12:55:00Z
2
value 0.05243
scoring_system epss
scoring_elements 0.89976
published_at 2026-04-09T12:55:00Z
3
value 0.05243
scoring_system epss
scoring_elements 0.89982
published_at 2026-04-12T12:55:00Z
4
value 0.05243
scoring_system epss
scoring_elements 0.89984
published_at 2026-04-11T12:55:00Z
5
value 0.05243
scoring_system epss
scoring_elements 0.89975
published_at 2026-04-13T12:55:00Z
6
value 0.0538
scoring_system epss
scoring_elements 0.9008
published_at 2026-04-04T12:55:00Z
7
value 0.0538
scoring_system epss
scoring_elements 0.90065
published_at 2026-04-01T12:55:00Z
8
value 0.0538
scoring_system epss
scoring_elements 0.90068
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43527
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2024370
reference_id 2024370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2024370
5
reference_url https://security.archlinux.org/ASA-202112-3
reference_id ASA-202112-3
reference_type
scores
url https://security.archlinux.org/ASA-202112-3
6
reference_url https://security.archlinux.org/ASA-202112-4
reference_id ASA-202112-4
reference_type
scores
url https://security.archlinux.org/ASA-202112-4
7
reference_url https://security.archlinux.org/AVG-2596
reference_id AVG-2596
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2596
8
reference_url https://security.archlinux.org/AVG-2597
reference_id AVG-2597
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2597
9
reference_url https://security.gentoo.org/glsa/202212-05
reference_id GLSA-202212-05
reference_type
scores
url https://security.gentoo.org/glsa/202212-05
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-51
reference_id mfsa2021-51
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-51
11
reference_url https://access.redhat.com/errata/RHSA-2021:4903
reference_id RHSA-2021:4903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4903
12
reference_url https://access.redhat.com/errata/RHSA-2021:4904
reference_id RHSA-2021:4904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4904
13
reference_url https://access.redhat.com/errata/RHSA-2021:4907
reference_id RHSA-2021:4907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4907
14
reference_url https://access.redhat.com/errata/RHSA-2021:4909
reference_id RHSA-2021:4909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4909
15
reference_url https://access.redhat.com/errata/RHSA-2021:4919
reference_id RHSA-2021:4919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4919
16
reference_url https://access.redhat.com/errata/RHSA-2021:4932
reference_id RHSA-2021:4932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4932
17
reference_url https://access.redhat.com/errata/RHSA-2021:4933
reference_id RHSA-2021:4933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4933
18
reference_url https://access.redhat.com/errata/RHSA-2021:4946
reference_id RHSA-2021:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4946
19
reference_url https://access.redhat.com/errata/RHSA-2021:4953
reference_id RHSA-2021:4953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4953
20
reference_url https://access.redhat.com/errata/RHSA-2021:4954
reference_id RHSA-2021:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4954
21
reference_url https://access.redhat.com/errata/RHSA-2021:4969
reference_id RHSA-2021:4969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4969
22
reference_url https://access.redhat.com/errata/RHSA-2021:4994
reference_id RHSA-2021:4994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4994
23
reference_url https://access.redhat.com/errata/RHSA-2021:5006
reference_id RHSA-2021:5006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5006
24
reference_url https://access.redhat.com/errata/RHSA-2021:5035
reference_id RHSA-2021:5035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5035
25
reference_url https://usn.ubuntu.com/5168-1/
reference_id USN-5168-1
reference_type
scores
url https://usn.ubuntu.com/5168-1/
26
reference_url https://usn.ubuntu.com/5168-2/
reference_id USN-5168-2
reference_type
scores
url https://usn.ubuntu.com/5168-2/
27
reference_url https://usn.ubuntu.com/5168-3/
reference_id USN-5168-3
reference_type
scores
url https://usn.ubuntu.com/5168-3/
28
reference_url https://usn.ubuntu.com/5168-4/
reference_id USN-5168-4
reference_type
scores
url https://usn.ubuntu.com/5168-4/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2021-43527
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrsz-ynp7-wbb2
20
url VCID-jvrr-2gej-bfby
vulnerability_id VCID-jvrr-2gej-bfby
summary nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12384.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12384
reference_id
reference_type
scores
0
value 0.00622
scoring_system epss
scoring_elements 0.70029
published_at 2026-04-01T12:55:00Z
1
value 0.00622
scoring_system epss
scoring_elements 0.70041
published_at 2026-04-02T12:55:00Z
2
value 0.00622
scoring_system epss
scoring_elements 0.70056
published_at 2026-04-04T12:55:00Z
3
value 0.00622
scoring_system epss
scoring_elements 0.70034
published_at 2026-04-07T12:55:00Z
4
value 0.00622
scoring_system epss
scoring_elements 0.70081
published_at 2026-04-08T12:55:00Z
5
value 0.00622
scoring_system epss
scoring_elements 0.70097
published_at 2026-04-09T12:55:00Z
6
value 0.00622
scoring_system epss
scoring_elements 0.7012
published_at 2026-04-11T12:55:00Z
7
value 0.00622
scoring_system epss
scoring_elements 0.70106
published_at 2026-04-12T12:55:00Z
8
value 0.00622
scoring_system epss
scoring_elements 0.70093
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12384
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1622089
reference_id 1622089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1622089
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908332
reference_id 908332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908332
6
reference_url https://access.redhat.com/errata/RHSA-2018:2768
reference_id RHSA-2018:2768
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2768
7
reference_url https://access.redhat.com/errata/RHSA-2018:2898
reference_id RHSA-2018:2898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2898
8
reference_url https://usn.ubuntu.com/3850-1/
reference_id USN-3850-1
reference_type
scores
url https://usn.ubuntu.com/3850-1/
9
reference_url https://usn.ubuntu.com/3850-2/
reference_id USN-3850-2
reference_type
scores
url https://usn.ubuntu.com/3850-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
aliases CVE-2018-12384
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvrr-2gej-bfby
21
url VCID-k2s2-zkua-8ydy
vulnerability_id VCID-k2s2-zkua-8ydy
summary
NSS has an information disclosure vulnerability when handling DSA
    keys.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12399.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12399
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26737
published_at 2026-04-13T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.2693
published_at 2026-04-04T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26718
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26787
published_at 2026-04-08T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26836
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26839
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26794
published_at 2026-04-12T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26854
published_at 2026-04-01T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26895
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12399
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1826177
reference_id 1826177
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1826177
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961752
reference_id 961752
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961752
13
reference_url https://security.archlinux.org/ASA-202006-1
reference_id ASA-202006-1
reference_type
scores
url https://security.archlinux.org/ASA-202006-1
14
reference_url https://security.archlinux.org/ASA-202006-4
reference_id ASA-202006-4
reference_type
scores
url https://security.archlinux.org/ASA-202006-4
15
reference_url https://security.archlinux.org/AVG-1173
reference_id AVG-1173
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1173
16
reference_url https://security.archlinux.org/AVG-1179
reference_id AVG-1179
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1179
17
reference_url https://security.gentoo.org/glsa/202007-49
reference_id GLSA-202007-49
reference_type
scores
url https://security.gentoo.org/glsa/202007-49
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-20
reference_id mfsa2020-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-20
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-21
reference_id mfsa2020-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-21
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-22
reference_id mfsa2020-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-22
21
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
22
reference_url https://usn.ubuntu.com/4383-1/
reference_id USN-4383-1
reference_type
scores
url https://usn.ubuntu.com/4383-1/
23
reference_url https://usn.ubuntu.com/4397-1/
reference_id USN-4397-1
reference_type
scores
url https://usn.ubuntu.com/4397-1/
24
reference_url https://usn.ubuntu.com/4397-2/
reference_id USN-4397-2
reference_type
scores
url https://usn.ubuntu.com/4397-2/
25
reference_url https://usn.ubuntu.com/4421-1/
reference_id USN-4421-1
reference_type
scores
url https://usn.ubuntu.com/4421-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-12399
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2s2-zkua-8ydy
22
url VCID-k4a4-f1as-x3bj
vulnerability_id VCID-k4a4-f1as-x3bj
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12400.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12400
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35057
published_at 2026-04-13T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35115
published_at 2026-04-11T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-12T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.34934
published_at 2026-04-01T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35132
published_at 2026-04-02T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35161
published_at 2026-04-04T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.3504
published_at 2026-04-07T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35085
published_at 2026-04-08T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35111
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12400
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1853983
reference_id 1853983
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1853983
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
7
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
8
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
11
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-12400
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4a4-f1as-x3bj
23
url VCID-kxvg-qw8v-vydv
vulnerability_id VCID-kxvg-qw8v-vydv
summary
Multiple vulnerabilities have been found in NSS, the worst of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5461.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5461.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5461
reference_id
reference_type
scores
0
value 0.00925
scoring_system epss
scoring_elements 0.76015
published_at 2026-04-13T12:55:00Z
1
value 0.00925
scoring_system epss
scoring_elements 0.76021
published_at 2026-04-12T12:55:00Z
2
value 0.00925
scoring_system epss
scoring_elements 0.76044
published_at 2026-04-11T12:55:00Z
3
value 0.00925
scoring_system epss
scoring_elements 0.75956
published_at 2026-04-01T12:55:00Z
4
value 0.00925
scoring_system epss
scoring_elements 0.75992
published_at 2026-04-04T12:55:00Z
5
value 0.00925
scoring_system epss
scoring_elements 0.76004
published_at 2026-04-08T12:55:00Z
6
value 0.00925
scoring_system epss
scoring_elements 0.75971
published_at 2026-04-07T12:55:00Z
7
value 0.00925
scoring_system epss
scoring_elements 0.75959
published_at 2026-04-02T12:55:00Z
8
value 0.00925
scoring_system epss
scoring_elements 0.76019
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5461
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1344380
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1344380
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
28
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes
29
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes
30
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes
31
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes
32
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
33
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461
34
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461
35
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461
36
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461
37
reference_url https://www.oracle.com//security-alerts/cpujul2021.html
reference_id
reference_type
scores
url https://www.oracle.com//security-alerts/cpujul2021.html
38
reference_url http://www.debian.org/security/2017/dsa-3831
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3831
39
reference_url http://www.debian.org/security/2017/dsa-3872
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3872
40
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
41
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
42
reference_url http://www.securityfocus.com/bid/98050
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/98050
43
reference_url http://www.securitytracker.com/id/1038320
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038320
44
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1440080
reference_id 1440080
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1440080
45
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862958
reference_id 862958
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862958
46
reference_url https://security.archlinux.org/ASA-201704-4
reference_id ASA-201704-4
reference_type
scores
url https://security.archlinux.org/ASA-201704-4
47
reference_url https://security.archlinux.org/ASA-201704-6
reference_id ASA-201704-6
reference_type
scores
url https://security.archlinux.org/ASA-201704-6
48
reference_url https://security.archlinux.org/ASA-201705-21
reference_id ASA-201705-21
reference_type
scores
url https://security.archlinux.org/ASA-201705-21
49
reference_url https://security.archlinux.org/AVG-247
reference_id AVG-247
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-247
50
reference_url https://security.archlinux.org/AVG-248
reference_id AVG-248
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-248
51
reference_url https://security.archlinux.org/AVG-249
reference_id AVG-249
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-249
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5461
reference_id CVE-2017-5461
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5461
54
reference_url https://security.gentoo.org/glsa/201705-04
reference_id GLSA-201705-04
reference_type
scores
url https://security.gentoo.org/glsa/201705-04
55
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
reference_id mfsa2017-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11
reference_id mfsa2017-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11
58
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
reference_id mfsa2017-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
59
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
reference_id mfsa2017-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
60
reference_url https://access.redhat.com/errata/RHSA-2017:1100
reference_id RHSA-2017:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1100
61
reference_url https://access.redhat.com/errata/RHSA-2017:1101
reference_id RHSA-2017:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1101
62
reference_url https://access.redhat.com/errata/RHSA-2017:1102
reference_id RHSA-2017:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1102
63
reference_url https://access.redhat.com/errata/RHSA-2017:1103
reference_id RHSA-2017:1103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1103
64
reference_url https://usn.ubuntu.com/3260-1/
reference_id USN-3260-1
reference_type
scores
url https://usn.ubuntu.com/3260-1/
65
reference_url https://usn.ubuntu.com/3270-1/
reference_id USN-3270-1
reference_type
scores
url https://usn.ubuntu.com/3270-1/
66
reference_url https://usn.ubuntu.com/3278-1/
reference_id USN-3278-1
reference_type
scores
url https://usn.ubuntu.com/3278-1/
67
reference_url https://usn.ubuntu.com/3372-1/
reference_id USN-3372-1
reference_type
scores
url https://usn.ubuntu.com/3372-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
1
url pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
purl pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ewe9-39b1-kba2
8
vulnerability VCID-fgv4-bz59-h7g7
9
vulnerability VCID-hs5f-21nx-gfeb
10
vulnerability VCID-jrsz-ynp7-wbb2
11
vulnerability VCID-jvrr-2gej-bfby
12
vulnerability VCID-k2s2-zkua-8ydy
13
vulnerability VCID-k4a4-f1as-x3bj
14
vulnerability VCID-mx8t-s47w-wud5
15
vulnerability VCID-paez-g9wh-mfeq
16
vulnerability VCID-rk7t-zjzg-eqar
17
vulnerability VCID-szzk-wxm2-cfgj
18
vulnerability VCID-vjas-pry4-93cz
19
vulnerability VCID-vszp-vyxy-f7g7
20
vulnerability VCID-vzb9-aeqz-hybr
21
vulnerability VCID-w794-gqex-83du
22
vulnerability VCID-wavp-f4kn-j3cm
23
vulnerability VCID-x1ty-wqph-gkak
24
vulnerability VCID-y43f-tmvr-hqas
25
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%252Bdeb9u1
aliases CVE-2017-5461
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kxvg-qw8v-vydv
24
url VCID-mwyu-5rk2-xbbz
vulnerability_id VCID-mwyu-5rk2-xbbz
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2721
reference_id
reference_type
scores
0
value 0.00607
scoring_system epss
scoring_elements 0.69676
published_at 2026-04-13T12:55:00Z
1
value 0.00607
scoring_system epss
scoring_elements 0.69606
published_at 2026-04-01T12:55:00Z
2
value 0.00607
scoring_system epss
scoring_elements 0.69619
published_at 2026-04-02T12:55:00Z
3
value 0.00607
scoring_system epss
scoring_elements 0.69635
published_at 2026-04-04T12:55:00Z
4
value 0.00607
scoring_system epss
scoring_elements 0.69614
published_at 2026-04-07T12:55:00Z
5
value 0.00607
scoring_system epss
scoring_elements 0.69665
published_at 2026-04-08T12:55:00Z
6
value 0.00607
scoring_system epss
scoring_elements 0.69682
published_at 2026-04-09T12:55:00Z
7
value 0.00607
scoring_system epss
scoring_elements 0.69704
published_at 2026-04-11T12:55:00Z
8
value 0.00607
scoring_system epss
scoring_elements 0.69689
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236967
reference_id 1236967
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236967
17
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
18
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
19
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-71
reference_id mfsa2015-71
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-71
21
reference_url https://access.redhat.com/errata/RHSA-2015:1185
reference_id RHSA-2015:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1185
22
reference_url https://access.redhat.com/errata/RHSA-2015:1664
reference_id RHSA-2015:1664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1664
23
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
24
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
25
reference_url https://usn.ubuntu.com/2672-1/
reference_id USN-2672-1
reference_type
scores
url https://usn.ubuntu.com/2672-1/
26
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2015-2721
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwyu-5rk2-xbbz
25
url VCID-mx8t-s47w-wud5
vulnerability_id VCID-mx8t-s47w-wud5
summary When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6829.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6829
reference_id
reference_type
scores
0
value 0.00584
scoring_system epss
scoring_elements 0.69005
published_at 2026-04-13T12:55:00Z
1
value 0.00584
scoring_system epss
scoring_elements 0.69049
published_at 2026-04-11T12:55:00Z
2
value 0.00584
scoring_system epss
scoring_elements 0.69034
published_at 2026-04-12T12:55:00Z
3
value 0.00584
scoring_system epss
scoring_elements 0.6894
published_at 2026-04-01T12:55:00Z
4
value 0.00584
scoring_system epss
scoring_elements 0.68958
published_at 2026-04-02T12:55:00Z
5
value 0.00584
scoring_system epss
scoring_elements 0.68978
published_at 2026-04-04T12:55:00Z
6
value 0.00584
scoring_system epss
scoring_elements 0.68957
published_at 2026-04-07T12:55:00Z
7
value 0.00584
scoring_system epss
scoring_elements 0.69007
published_at 2026-04-08T12:55:00Z
8
value 0.00584
scoring_system epss
scoring_elements 0.69027
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6829
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1826187
reference_id 1826187
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1826187
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
6
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
7
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
8
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
9
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
10
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-6829
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mx8t-s47w-wud5
26
url VCID-paez-g9wh-mfeq
vulnerability_id VCID-paez-g9wh-mfeq
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6609
reference_id
reference_type
scores
0
value 0.00572
scoring_system epss
scoring_elements 0.68638
published_at 2026-04-04T12:55:00Z
1
value 0.00572
scoring_system epss
scoring_elements 0.68664
published_at 2026-04-13T12:55:00Z
2
value 0.00572
scoring_system epss
scoring_elements 0.68694
published_at 2026-04-12T12:55:00Z
3
value 0.00572
scoring_system epss
scoring_elements 0.68707
published_at 2026-04-11T12:55:00Z
4
value 0.00572
scoring_system epss
scoring_elements 0.68614
published_at 2026-04-07T12:55:00Z
5
value 0.00572
scoring_system epss
scoring_elements 0.6862
published_at 2026-04-02T12:55:00Z
6
value 0.00572
scoring_system epss
scoring_elements 0.68683
published_at 2026-04-09T12:55:00Z
7
value 0.00572
scoring_system epss
scoring_elements 0.68665
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6609
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6609
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
5
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T19:02:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
7
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T19:02:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1839258
reference_id show_bug.cgi?id=1839258
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T19:02:00Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1839258
9
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-gret-hn3p-5kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1
aliases CVE-2024-6609
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-paez-g9wh-mfeq
27
url VCID-pc13-zwmr-p7hz
vulnerability_id VCID-pc13-zwmr-p7hz
summary
Multiple vulnerabilities have been found in NSS, the worst of which
    could allow remote attackers to obtain access to private key information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8635.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8635
reference_id
reference_type
scores
0
value 0.00415
scoring_system epss
scoring_elements 0.61508
published_at 2026-04-01T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61582
published_at 2026-04-02T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61612
published_at 2026-04-04T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61583
published_at 2026-04-07T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.61631
published_at 2026-04-08T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61646
published_at 2026-04-09T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.61667
published_at 2026-04-11T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61656
published_at 2026-04-12T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61636
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8635
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8635
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1391818
reference_id 1391818
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1391818
5
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
6
reference_url https://access.redhat.com/errata/RHSA-2016:2779
reference_id RHSA-2016:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2779
7
reference_url https://usn.ubuntu.com/3163-1/
reference_id USN-3163-1
reference_type
scores
url https://usn.ubuntu.com/3163-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2016-8635
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pc13-zwmr-p7hz
28
url VCID-qup9-qy11-fqhe
vulnerability_id VCID-qup9-qy11-fqhe
summary
Multiple vulnerabilities have been found in mbed TLS, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
10
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
11
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
12
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
13
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
14
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
15
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
22
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
23
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
reference_id
reference_type
scores
0
value 0.01509
scoring_system epss
scoring_elements 0.81189
published_at 2026-04-13T12:55:00Z
1
value 0.01509
scoring_system epss
scoring_elements 0.81125
published_at 2026-04-01T12:55:00Z
2
value 0.01509
scoring_system epss
scoring_elements 0.81184
published_at 2026-04-08T12:55:00Z
3
value 0.01509
scoring_system epss
scoring_elements 0.8119
published_at 2026-04-09T12:55:00Z
4
value 0.01509
scoring_system epss
scoring_elements 0.8121
published_at 2026-04-11T12:55:00Z
5
value 0.01509
scoring_system epss
scoring_elements 0.81196
published_at 2026-04-12T12:55:00Z
6
value 0.01509
scoring_system epss
scoring_elements 0.81134
published_at 2026-04-02T12:55:00Z
7
value 0.01509
scoring_system epss
scoring_elements 0.81157
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
24
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
55
reference_url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
56
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
57
reference_url https://security.netapp.com/advisory/ntap-20160225-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20160225-0001/
58
reference_url http://www.debian.org/security/2016/dsa-3436
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3436
59
reference_url http://www.debian.org/security/2016/dsa-3437
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3437
60
reference_url http://www.debian.org/security/2016/dsa-3457
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3457
61
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
62
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
63
reference_url http://www.debian.org/security/2016/dsa-3491
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3491
64
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
65
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
66
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
67
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
68
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
69
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
70
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
71
reference_url http://www.securityfocus.com/bid/79684
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79684
72
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
73
reference_url http://www.securitytracker.com/id/1034541
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034541
74
reference_url http://www.securitytracker.com/id/1036467
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036467
75
reference_url http://www.ubuntu.com/usn/USN-2863-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2863-1
76
reference_url http://www.ubuntu.com/usn/USN-2864-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2864-1
77
reference_url http://www.ubuntu.com/usn/USN-2865-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2865-1
78
reference_url http://www.ubuntu.com/usn/USN-2866-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2866-1
79
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
80
reference_url http://www.ubuntu.com/usn/USN-2904-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2904-1
81
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
reference_id 1289841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
reference_id CVE-2015-7575
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
102
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
103
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
104
reference_url https://security.gentoo.org/glsa/201706-18
reference_id GLSA-201706-18
reference_type
scores
url https://security.gentoo.org/glsa/201706-18
105
reference_url https://security.gentoo.org/glsa/201801-15
reference_id GLSA-201801-15
reference_type
scores
url https://security.gentoo.org/glsa/201801-15
106
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
reference_id mfsa2015-150
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
107
reference_url https://access.redhat.com/errata/RHSA-2016:0007
reference_id RHSA-2016:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0007
108
reference_url https://access.redhat.com/errata/RHSA-2016:0008
reference_id RHSA-2016:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0008
109
reference_url https://access.redhat.com/errata/RHSA-2016:0012
reference_id RHSA-2016:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0012
110
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
111
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
112
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
113
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
114
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
115
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
116
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
117
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
118
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
119
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
120
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
121
reference_url https://usn.ubuntu.com/2863-1/
reference_id USN-2863-1
reference_type
scores
url https://usn.ubuntu.com/2863-1/
122
reference_url https://usn.ubuntu.com/2864-1/
reference_id USN-2864-1
reference_type
scores
url https://usn.ubuntu.com/2864-1/
123
reference_url https://usn.ubuntu.com/2865-1/
reference_id USN-2865-1
reference_type
scores
url https://usn.ubuntu.com/2865-1/
124
reference_url https://usn.ubuntu.com/2866-1/
reference_id USN-2866-1
reference_type
scores
url https://usn.ubuntu.com/2866-1/
125
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
126
reference_url https://usn.ubuntu.com/2904-1/
reference_id USN-2904-1
reference_type
scores
url https://usn.ubuntu.com/2904-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2015-7575
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qup9-qy11-fqhe
29
url VCID-rk7t-zjzg-eqar
vulnerability_id VCID-rk7t-zjzg-eqar
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12401.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12401.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12401
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40566
published_at 2026-04-13T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40604
published_at 2026-04-09T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-12T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40514
published_at 2026-04-01T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40595
published_at 2026-04-08T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40622
published_at 2026-04-11T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40544
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12401
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851294
reference_id 1851294
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851294
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
7
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
8
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
11
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-12401
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rk7t-zjzg-eqar
30
url VCID-rzqy-gheq-cqgg
vulnerability_id VCID-rzqy-gheq-cqgg
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4000
reference_id
reference_type
scores
0
value 0.93743
scoring_system epss
scoring_elements 0.99851
published_at 2026-04-07T12:55:00Z
1
value 0.93894
scoring_system epss
scoring_elements 0.99875
published_at 2026-04-08T12:55:00Z
2
value 0.93894
scoring_system epss
scoring_elements 0.99876
published_at 2026-04-09T12:55:00Z
3
value 0.939
scoring_system epss
scoring_elements 0.99876
published_at 2026-04-13T12:55:00Z
4
value 0.939
scoring_system epss
scoring_elements 0.99873
published_at 2026-04-01T12:55:00Z
5
value 0.939
scoring_system epss
scoring_elements 0.99874
published_at 2026-04-02T12:55:00Z
6
value 0.939
scoring_system epss
scoring_elements 0.99875
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
47
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1223211
reference_id 1223211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1223211
49
reference_url https://security.gentoo.org/glsa/201506-02
reference_id GLSA-201506-02
reference_type
scores
url https://security.gentoo.org/glsa/201506-02
50
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
51
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
52
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
53
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-70
reference_id mfsa2015-70
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-70
55
reference_url https://access.redhat.com/errata/RHSA-2015:1072
reference_id RHSA-2015:1072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1072
56
reference_url https://access.redhat.com/errata/RHSA-2015:1185
reference_id RHSA-2015:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1185
57
reference_url https://access.redhat.com/errata/RHSA-2015:1197
reference_id RHSA-2015:1197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1197
58
reference_url https://access.redhat.com/errata/RHSA-2015:1228
reference_id RHSA-2015:1228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1228
59
reference_url https://access.redhat.com/errata/RHSA-2015:1229
reference_id RHSA-2015:1229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1229
60
reference_url https://access.redhat.com/errata/RHSA-2015:1230
reference_id RHSA-2015:1230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1230
61
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
62
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
63
reference_url https://access.redhat.com/errata/RHSA-2015:1243
reference_id RHSA-2015:1243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1243
64
reference_url https://access.redhat.com/errata/RHSA-2015:1485
reference_id RHSA-2015:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1485
65
reference_url https://access.redhat.com/errata/RHSA-2015:1486
reference_id RHSA-2015:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1486
66
reference_url https://access.redhat.com/errata/RHSA-2015:1488
reference_id RHSA-2015:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1488
67
reference_url https://access.redhat.com/errata/RHSA-2015:1526
reference_id RHSA-2015:1526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1526
68
reference_url https://access.redhat.com/errata/RHSA-2015:1544
reference_id RHSA-2015:1544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1544
69
reference_url https://access.redhat.com/errata/RHSA-2015:1604
reference_id RHSA-2015:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1604
70
reference_url https://access.redhat.com/errata/RHSA-2016:2056
reference_id RHSA-2016:2056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2056
71
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
72
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
73
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
74
reference_url https://usn.ubuntu.com/2696-1/
reference_id USN-2696-1
reference_type
scores
url https://usn.ubuntu.com/2696-1/
75
reference_url https://usn.ubuntu.com/2706-1/
reference_id USN-2706-1
reference_type
scores
url https://usn.ubuntu.com/2706-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2015-4000
risk_score 7.2
exploitability 2.0
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqy-gheq-cqgg
31
url VCID-szzk-wxm2-cfgj
vulnerability_id VCID-szzk-wxm2-cfgj
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12403.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12403
reference_id
reference_type
scores
0
value 0.00635
scoring_system epss
scoring_elements 0.70331
published_at 2026-04-01T12:55:00Z
1
value 0.00635
scoring_system epss
scoring_elements 0.70344
published_at 2026-04-02T12:55:00Z
2
value 0.00635
scoring_system epss
scoring_elements 0.70361
published_at 2026-04-04T12:55:00Z
3
value 0.00635
scoring_system epss
scoring_elements 0.70339
published_at 2026-04-07T12:55:00Z
4
value 0.00635
scoring_system epss
scoring_elements 0.70385
published_at 2026-04-08T12:55:00Z
5
value 0.00635
scoring_system epss
scoring_elements 0.704
published_at 2026-04-09T12:55:00Z
6
value 0.00635
scoring_system epss
scoring_elements 0.70424
published_at 2026-04-11T12:55:00Z
7
value 0.00635
scoring_system epss
scoring_elements 0.70408
published_at 2026-04-12T12:55:00Z
8
value 0.00635
scoring_system epss
scoring_elements 0.70394
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12403
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1868931
reference_id 1868931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1868931
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
6
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
7
reference_url https://access.redhat.com/errata/RHSA-2021:0758
reference_id RHSA-2021:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0758
8
reference_url https://access.redhat.com/errata/RHSA-2021:0876
reference_id RHSA-2021:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0876
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://access.redhat.com/errata/RHSA-2021:1026
reference_id RHSA-2021:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1026
11
reference_url https://usn.ubuntu.com/4476-1/
reference_id USN-4476-1
reference_type
scores
url https://usn.ubuntu.com/4476-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-12403
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-szzk-wxm2-cfgj
32
url VCID-t89f-eksr-juen
vulnerability_id VCID-t89f-eksr-juen
summary nss: Null pointer dereference when handling empty SSLv2 messages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7502.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7502
reference_id
reference_type
scores
0
value 0.02085
scoring_system epss
scoring_elements 0.8394
published_at 2026-04-01T12:55:00Z
1
value 0.02085
scoring_system epss
scoring_elements 0.83972
published_at 2026-04-07T12:55:00Z
2
value 0.02085
scoring_system epss
scoring_elements 0.84002
published_at 2026-04-09T12:55:00Z
3
value 0.02085
scoring_system epss
scoring_elements 0.84017
published_at 2026-04-11T12:55:00Z
4
value 0.02085
scoring_system epss
scoring_elements 0.84011
published_at 2026-04-12T12:55:00Z
5
value 0.02085
scoring_system epss
scoring_elements 0.83954
published_at 2026-04-02T12:55:00Z
6
value 0.02085
scoring_system epss
scoring_elements 0.8397
published_at 2026-04-04T12:55:00Z
7
value 0.02085
scoring_system epss
scoring_elements 0.83995
published_at 2026-04-08T12:55:00Z
8
value 0.02098
scoring_system epss
scoring_elements 0.84048
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446631
reference_id 1446631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446631
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863839
reference_id 863839
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863839
8
reference_url https://access.redhat.com/errata/RHSA-2017:1364
reference_id RHSA-2017:1364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1364
9
reference_url https://access.redhat.com/errata/RHSA-2017:1365
reference_id RHSA-2017:1365
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1365
10
reference_url https://access.redhat.com/errata/RHSA-2017:1567
reference_id RHSA-2017:1567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1567
11
reference_url https://usn.ubuntu.com/3336-1/
reference_id USN-3336-1
reference_type
scores
url https://usn.ubuntu.com/3336-1/
12
reference_url https://usn.ubuntu.com/3372-1/
reference_id USN-3372-1
reference_type
scores
url https://usn.ubuntu.com/3372-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
1
url pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
purl pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ewe9-39b1-kba2
8
vulnerability VCID-fgv4-bz59-h7g7
9
vulnerability VCID-hs5f-21nx-gfeb
10
vulnerability VCID-jrsz-ynp7-wbb2
11
vulnerability VCID-jvrr-2gej-bfby
12
vulnerability VCID-k2s2-zkua-8ydy
13
vulnerability VCID-k4a4-f1as-x3bj
14
vulnerability VCID-mx8t-s47w-wud5
15
vulnerability VCID-paez-g9wh-mfeq
16
vulnerability VCID-rk7t-zjzg-eqar
17
vulnerability VCID-szzk-wxm2-cfgj
18
vulnerability VCID-vjas-pry4-93cz
19
vulnerability VCID-vszp-vyxy-f7g7
20
vulnerability VCID-vzb9-aeqz-hybr
21
vulnerability VCID-w794-gqex-83du
22
vulnerability VCID-wavp-f4kn-j3cm
23
vulnerability VCID-x1ty-wqph-gkak
24
vulnerability VCID-y43f-tmvr-hqas
25
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%252Bdeb9u1
aliases CVE-2017-7502
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t89f-eksr-juen
33
url VCID-ukuz-m6d3-5kab
vulnerability_id VCID-ukuz-m6d3-5kab
summary
Multiple vulnerabilities have been found in NSS, the worst of which
    could allow remote attackers to obtain access to private key information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5285.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5285.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5285
reference_id
reference_type
scores
0
value 0.01626
scoring_system epss
scoring_elements 0.81796
published_at 2026-04-01T12:55:00Z
1
value 0.01626
scoring_system epss
scoring_elements 0.81806
published_at 2026-04-02T12:55:00Z
2
value 0.01626
scoring_system epss
scoring_elements 0.81829
published_at 2026-04-04T12:55:00Z
3
value 0.01626
scoring_system epss
scoring_elements 0.81826
published_at 2026-04-07T12:55:00Z
4
value 0.01626
scoring_system epss
scoring_elements 0.81852
published_at 2026-04-08T12:55:00Z
5
value 0.01626
scoring_system epss
scoring_elements 0.81859
published_at 2026-04-09T12:55:00Z
6
value 0.01626
scoring_system epss
scoring_elements 0.81878
published_at 2026-04-11T12:55:00Z
7
value 0.01626
scoring_system epss
scoring_elements 0.81866
published_at 2026-04-12T12:55:00Z
8
value 0.01626
scoring_system epss
scoring_elements 0.81861
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5285
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5285
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1383883
reference_id 1383883
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1383883
5
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
6
reference_url https://access.redhat.com/errata/RHSA-2016:2779
reference_id RHSA-2016:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2779
7
reference_url https://usn.ubuntu.com/3163-1/
reference_id USN-3163-1
reference_type
scores
url https://usn.ubuntu.com/3163-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2016-5285
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ukuz-m6d3-5kab
34
url VCID-vjas-pry4-93cz
vulnerability_id VCID-vjas-pry4-93cz
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12402.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12402
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.28029
published_at 2026-04-13T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28122
published_at 2026-04-09T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.28129
published_at 2026-04-11T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28086
published_at 2026-04-12T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.28102
published_at 2026-04-01T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28174
published_at 2026-04-02T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.28218
published_at 2026-04-04T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.28012
published_at 2026-04-07T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.28079
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12402
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1826231
reference_id 1826231
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1826231
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963152
reference_id 963152
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963152
9
reference_url https://security.gentoo.org/glsa/202007-10
reference_id GLSA-202007-10
reference_type
scores
url https://security.gentoo.org/glsa/202007-10
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
reference_id mfsa2020-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
reference_id mfsa2020-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
12
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
13
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
14
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
15
reference_url https://usn.ubuntu.com/4417-1/
reference_id USN-4417-1
reference_type
scores
url https://usn.ubuntu.com/4417-1/
16
reference_url https://usn.ubuntu.com/4417-2/
reference_id USN-4417-2
reference_type
scores
url https://usn.ubuntu.com/4417-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-12402
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjas-pry4-93cz
35
url VCID-vszp-vyxy-f7g7
vulnerability_id VCID-vszp-vyxy-f7g7
summary Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2781.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2781
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15358
published_at 2026-04-13T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15422
published_at 2026-04-12T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15461
published_at 2026-04-11T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15497
published_at 2026-04-09T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15489
published_at 2026-04-02T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15447
published_at 2026-04-08T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.1536
published_at 2026-04-07T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.1556
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2781
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442292
reference_id 2442292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442292
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2009552
reference_id show_bug.cgi?id=2009552
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2009552
39
reference_url https://usn.ubuntu.com/8071-1/
reference_id USN-8071-1
reference_type
scores
url https://usn.ubuntu.com/8071-1/
40
reference_url https://usn.ubuntu.com/8071-2/
reference_id USN-8071-2
reference_type
scores
url https://usn.ubuntu.com/8071-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-gret-hn3p-5kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1
aliases CVE-2026-2781
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vszp-vyxy-f7g7
36
url VCID-vzb9-aeqz-hybr
vulnerability_id VCID-vzb9-aeqz-hybr
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11745
reference_id
reference_type
scores
0
value 0.00806
scoring_system epss
scoring_elements 0.74149
published_at 2026-04-13T12:55:00Z
1
value 0.00806
scoring_system epss
scoring_elements 0.74133
published_at 2026-04-04T12:55:00Z
2
value 0.00806
scoring_system epss
scoring_elements 0.74105
published_at 2026-04-07T12:55:00Z
3
value 0.00806
scoring_system epss
scoring_elements 0.74137
published_at 2026-04-08T12:55:00Z
4
value 0.00806
scoring_system epss
scoring_elements 0.74152
published_at 2026-04-09T12:55:00Z
5
value 0.00806
scoring_system epss
scoring_elements 0.74174
published_at 2026-04-11T12:55:00Z
6
value 0.00806
scoring_system epss
scoring_elements 0.74155
published_at 2026-04-12T12:55:00Z
7
value 0.00806
scoring_system epss
scoring_elements 0.74101
published_at 2026-04-01T12:55:00Z
8
value 0.00806
scoring_system epss
scoring_elements 0.74107
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1774831
reference_id 1774831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1774831
6
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
7
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
8
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
9
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
10
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
11
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
12
reference_url https://security.gentoo.org/glsa/202003-37
reference_id GLSA-202003-37
reference_type
scores
url https://security.gentoo.org/glsa/202003-37
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
16
reference_url https://access.redhat.com/errata/RHSA-2019:4114
reference_id RHSA-2019:4114
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4114
17
reference_url https://access.redhat.com/errata/RHSA-2019:4152
reference_id RHSA-2019:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4152
18
reference_url https://access.redhat.com/errata/RHSA-2019:4190
reference_id RHSA-2019:4190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4190
19
reference_url https://access.redhat.com/errata/RHSA-2020:0243
reference_id RHSA-2020:0243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0243
20
reference_url https://access.redhat.com/errata/RHSA-2020:0466
reference_id RHSA-2020:0466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0466
21
reference_url https://access.redhat.com/errata/RHSA-2020:1267
reference_id RHSA-2020:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1267
22
reference_url https://access.redhat.com/errata/RHSA-2020:1345
reference_id RHSA-2020:1345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1345
23
reference_url https://access.redhat.com/errata/RHSA-2020:1461
reference_id RHSA-2020:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1461
24
reference_url https://usn.ubuntu.com/4203-1/
reference_id USN-4203-1
reference_type
scores
url https://usn.ubuntu.com/4203-1/
25
reference_url https://usn.ubuntu.com/4203-2/
reference_id USN-4203-2
reference_type
scores
url https://usn.ubuntu.com/4203-2/
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-11745
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vzb9-aeqz-hybr
37
url VCID-w794-gqex-83du
vulnerability_id VCID-w794-gqex-83du
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6602
reference_id
reference_type
scores
0
value 0.00768
scoring_system epss
scoring_elements 0.7349
published_at 2026-04-13T12:55:00Z
1
value 0.00768
scoring_system epss
scoring_elements 0.73497
published_at 2026-04-12T12:55:00Z
2
value 0.00768
scoring_system epss
scoring_elements 0.73448
published_at 2026-04-02T12:55:00Z
3
value 0.00768
scoring_system epss
scoring_elements 0.73493
published_at 2026-04-09T12:55:00Z
4
value 0.00768
scoring_system epss
scoring_elements 0.7348
published_at 2026-04-08T12:55:00Z
5
value 0.00768
scoring_system epss
scoring_elements 0.73443
published_at 2026-04-07T12:55:00Z
6
value 0.00768
scoring_system epss
scoring_elements 0.73471
published_at 2026-04-04T12:55:00Z
7
value 0.00768
scoring_system epss
scoring_elements 0.73517
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2296637
reference_id 2296637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2296637
9
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
10
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
11
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
reference_id mfsa2024-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-30/
reference_id mfsa2024-30
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-30/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
reference_id mfsa2024-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-31/
reference_id mfsa2024-31
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-31/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
20
reference_url https://access.redhat.com/errata/RHSA-2024:4625
reference_id RHSA-2024:4625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4625
21
reference_url https://access.redhat.com/errata/RHSA-2024:4670
reference_id RHSA-2024:4670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4670
22
reference_url https://access.redhat.com/errata/RHSA-2024:4671
reference_id RHSA-2024:4671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4671
23
reference_url https://access.redhat.com/errata/RHSA-2024:4717
reference_id RHSA-2024:4717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4717
24
reference_url https://access.redhat.com/errata/RHSA-2024:4718
reference_id RHSA-2024:4718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4718
25
reference_url https://access.redhat.com/errata/RHSA-2024:4894
reference_id RHSA-2024:4894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4894
26
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
27
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
reference_id show_bug.cgi?id=1895032
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
28
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
29
reference_url https://usn.ubuntu.com/6903-1/
reference_id USN-6903-1
reference_type
scores
url https://usn.ubuntu.com/6903-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-gret-hn3p-5kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1
aliases CVE-2024-6602
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w794-gqex-83du
38
url VCID-wavp-f4kn-j3cm
vulnerability_id VCID-wavp-f4kn-j3cm
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11727.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11727
reference_id
reference_type
scores
0
value 0.00248
scoring_system epss
scoring_elements 0.48111
published_at 2026-04-13T12:55:00Z
1
value 0.00248
scoring_system epss
scoring_elements 0.48106
published_at 2026-04-08T12:55:00Z
2
value 0.00248
scoring_system epss
scoring_elements 0.48101
published_at 2026-04-09T12:55:00Z
3
value 0.00248
scoring_system epss
scoring_elements 0.48124
published_at 2026-04-11T12:55:00Z
4
value 0.00248
scoring_system epss
scoring_elements 0.481
published_at 2026-04-12T12:55:00Z
5
value 0.00248
scoring_system epss
scoring_elements 0.48045
published_at 2026-04-01T12:55:00Z
6
value 0.00248
scoring_system epss
scoring_elements 0.48082
published_at 2026-04-02T12:55:00Z
7
value 0.00248
scoring_system epss
scoring_elements 0.48103
published_at 2026-04-04T12:55:00Z
8
value 0.00248
scoring_system epss
scoring_elements 0.48053
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1730988
reference_id 1730988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1730988
5
reference_url https://security.archlinux.org/ASA-201907-4
reference_id ASA-201907-4
reference_type
scores
url https://security.archlinux.org/ASA-201907-4
6
reference_url https://security.archlinux.org/AVG-1002
reference_id AVG-1002
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1002
7
reference_url https://security.gentoo.org/glsa/201908-12
reference_id GLSA-201908-12
reference_type
scores
url https://security.gentoo.org/glsa/201908-12
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
reference_id mfsa2019-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
reference_id mfsa2019-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
10
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
11
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
12
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
13
reference_url https://usn.ubuntu.com/4054-1/
reference_id USN-4054-1
reference_type
scores
url https://usn.ubuntu.com/4054-1/
14
reference_url https://usn.ubuntu.com/4060-1/
reference_id USN-4060-1
reference_type
scores
url https://usn.ubuntu.com/4060-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-11727
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wavp-f4kn-j3cm
39
url VCID-wut5-sqr6-mubd
vulnerability_id VCID-wut5-sqr6-mubd
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0591.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0591.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0684.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0684.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0685.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0685.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1978.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1978.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1978
reference_id
reference_type
scores
0
value 0.02458
scoring_system epss
scoring_elements 0.85233
published_at 2026-04-13T12:55:00Z
1
value 0.02458
scoring_system epss
scoring_elements 0.85163
published_at 2026-04-01T12:55:00Z
2
value 0.02458
scoring_system epss
scoring_elements 0.85224
published_at 2026-04-09T12:55:00Z
3
value 0.02458
scoring_system epss
scoring_elements 0.85239
published_at 2026-04-11T12:55:00Z
4
value 0.02458
scoring_system epss
scoring_elements 0.85236
published_at 2026-04-12T12:55:00Z
5
value 0.02458
scoring_system epss
scoring_elements 0.85175
published_at 2026-04-02T12:55:00Z
6
value 0.02458
scoring_system epss
scoring_elements 0.85193
published_at 2026-04-04T12:55:00Z
7
value 0.02458
scoring_system epss
scoring_elements 0.85194
published_at 2026-04-07T12:55:00Z
8
value 0.02458
scoring_system epss
scoring_elements 0.85216
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1978
9
reference_url https://bto.bluecoat.com/security-advisory/sa124
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa124
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1209546
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1209546
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
16
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
17
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
18
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-15.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-15.html
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
20
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
21
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
22
reference_url http://www.securityfocus.com/bid/84275
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84275
23
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
24
reference_url http://www.securitytracker.com/id/1035258
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035258
25
reference_url http://www.ubuntu.com/usn/USN-2973-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2973-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1315565
reference_id 1315565
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1315565
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1978
reference_id CVE-2016-1978
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1978
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1978
reference_id CVE-2016-1978
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2016-1978
31
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
32
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-15
reference_id mfsa2016-15
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-15
33
reference_url https://access.redhat.com/errata/RHSA-2016:0591
reference_id RHSA-2016:0591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0591
34
reference_url https://access.redhat.com/errata/RHSA-2016:0684
reference_id RHSA-2016:0684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0684
35
reference_url https://access.redhat.com/errata/RHSA-2016:0685
reference_id RHSA-2016:0685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0685
36
reference_url https://usn.ubuntu.com/2973-1/
reference_id USN-2973-1
reference_type
scores
url https://usn.ubuntu.com/2973-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2016-1978
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wut5-sqr6-mubd
40
url VCID-x1ty-wqph-gkak
vulnerability_id VCID-x1ty-wqph-gkak
summary nss: Handling of Netscape Certificate Sequences in CERT_DecodeCertPackage() may crash with a NULL deref leading to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17007.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17007
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.53893
published_at 2026-04-01T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.5391
published_at 2026-04-02T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53938
published_at 2026-04-04T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.53913
published_at 2026-04-07T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.53965
published_at 2026-04-08T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.53964
published_at 2026-04-09T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.54011
published_at 2026-04-11T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.53994
published_at 2026-04-12T12:55:00Z
8
value 0.00308
scoring_system epss
scoring_elements 0.53976
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1703979
reference_id 1703979
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1703979
6
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
7
reference_url https://access.redhat.com/errata/RHSA-2019:2237
reference_id RHSA-2019:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2237
8
reference_url https://access.redhat.com/errata/RHSA-2021:0876
reference_id RHSA-2021:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0876
9
reference_url https://usn.ubuntu.com/4215-1/
reference_id USN-4215-1
reference_type
scores
url https://usn.ubuntu.com/4215-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-17007
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x1ty-wqph-gkak
41
url VCID-y43f-tmvr-hqas
vulnerability_id VCID-y43f-tmvr-hqas
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22747.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22747.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22747
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.32419
published_at 2026-04-13T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.32446
published_at 2026-04-12T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.32582
published_at 2026-04-04T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32546
published_at 2026-04-02T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.32485
published_at 2026-04-11T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.3248
published_at 2026-04-09T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.32406
published_at 2026-04-07T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32454
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22747
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039572
reference_id 2039572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039572
16
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
17
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
19
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
21
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
23
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
24
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
25
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
26
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
27
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
28
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
29
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
30
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
31
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
32
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
33
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1735028
reference_id show_bug.cgi?id=1735028
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1735028
35
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
36
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
37
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
38
reference_url https://usn.ubuntu.com/5506-1/
reference_id USN-5506-1
reference_type
scores
url https://usn.ubuntu.com/5506-1/
39
reference_url https://usn.ubuntu.com/5872-1/
reference_id USN-5872-1
reference_type
scores
url https://usn.ubuntu.com/5872-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2022-22747
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y43f-tmvr-hqas
42
url VCID-ykkw-a6a1-43fe
vulnerability_id VCID-ykkw-a6a1-43fe
summary nss: Cache side-channel variant of the Bleichenbacher attack
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12404.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12404
reference_id
reference_type
scores
0
value 0.14501
scoring_system epss
scoring_elements 0.94413
published_at 2026-04-01T12:55:00Z
1
value 0.14501
scoring_system epss
scoring_elements 0.9442
published_at 2026-04-02T12:55:00Z
2
value 0.14501
scoring_system epss
scoring_elements 0.9443
published_at 2026-04-04T12:55:00Z
3
value 0.14501
scoring_system epss
scoring_elements 0.94433
published_at 2026-04-07T12:55:00Z
4
value 0.14501
scoring_system epss
scoring_elements 0.94442
published_at 2026-04-08T12:55:00Z
5
value 0.14501
scoring_system epss
scoring_elements 0.94446
published_at 2026-04-09T12:55:00Z
6
value 0.14501
scoring_system epss
scoring_elements 0.94449
published_at 2026-04-11T12:55:00Z
7
value 0.14501
scoring_system epss
scoring_elements 0.94451
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12404
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12404
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1657913
reference_id 1657913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1657913
5
reference_url https://access.redhat.com/errata/RHSA-2019:2237
reference_id RHSA-2019:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2237
6
reference_url https://usn.ubuntu.com/3850-1/
reference_id USN-3850-1
reference_type
scores
url https://usn.ubuntu.com/3850-1/
7
reference_url https://usn.ubuntu.com/3850-2/
reference_id USN-3850-2
reference_type
scores
url https://usn.ubuntu.com/3850-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
aliases CVE-2018-12404
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ykkw-a6a1-43fe
43
url VCID-z26z-btvf-x7eq
vulnerability_id VCID-z26z-btvf-x7eq
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-1980.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1980.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-1981.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1981.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7182.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7182.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7182
reference_id
reference_type
scores
0
value 0.11044
scoring_system epss
scoring_elements 0.9344
published_at 2026-04-13T12:55:00Z
1
value 0.11044
scoring_system epss
scoring_elements 0.93405
published_at 2026-04-01T12:55:00Z
2
value 0.11044
scoring_system epss
scoring_elements 0.93433
published_at 2026-04-09T12:55:00Z
3
value 0.11044
scoring_system epss
scoring_elements 0.93438
published_at 2026-04-11T12:55:00Z
4
value 0.11044
scoring_system epss
scoring_elements 0.93439
published_at 2026-04-12T12:55:00Z
5
value 0.11044
scoring_system epss
scoring_elements 0.93413
published_at 2026-04-02T12:55:00Z
6
value 0.11044
scoring_system epss
scoring_elements 0.93421
published_at 2026-04-07T12:55:00Z
7
value 0.11044
scoring_system epss
scoring_elements 0.93429
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7182
12
reference_url https://bto.bluecoat.com/security-advisory/sa119
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa119
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1202868
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1202868
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
34
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
35
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
36
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
37
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
38
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
39
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
40
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
41
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
43
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
44
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
45
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
46
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
47
reference_url http://www.securityfocus.com/bid/77416
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77416
48
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
49
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
50
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
51
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
52
reference_url http://www.ubuntu.com/usn/USN-2791-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2791-1
53
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1269351
reference_id 1269351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1269351
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7182
reference_id CVE-2015-7182
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-7182
73
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
74
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
75
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
reference_id mfsa2015-133
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
76
reference_url https://access.redhat.com/errata/RHSA-2015:1980
reference_id RHSA-2015:1980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1980
77
reference_url https://access.redhat.com/errata/RHSA-2015:1981
reference_id RHSA-2015:1981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1981
78
reference_url https://access.redhat.com/errata/RHSA-2015:2068
reference_id RHSA-2015:2068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2068
79
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
80
reference_url https://usn.ubuntu.com/2791-1/
reference_id USN-2791-1
reference_type
scores
url https://usn.ubuntu.com/2791-1/
81
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
aliases CVE-2015-7182
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z26z-btvf-x7eq
Fixing_vulnerabilities
0
url VCID-1ert-2qyc-cfc1
vulnerability_id VCID-1ert-2qyc-cfc1
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1492.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1492
reference_id
reference_type
scores
0
value 0.00829
scoring_system epss
scoring_elements 0.74517
published_at 2026-04-13T12:55:00Z
1
value 0.00829
scoring_system epss
scoring_elements 0.74471
published_at 2026-04-01T12:55:00Z
2
value 0.00829
scoring_system epss
scoring_elements 0.74474
published_at 2026-04-02T12:55:00Z
3
value 0.00829
scoring_system epss
scoring_elements 0.745
published_at 2026-04-04T12:55:00Z
4
value 0.00829
scoring_system epss
scoring_elements 0.74475
published_at 2026-04-07T12:55:00Z
5
value 0.00829
scoring_system epss
scoring_elements 0.74507
published_at 2026-04-08T12:55:00Z
6
value 0.00829
scoring_system epss
scoring_elements 0.74523
published_at 2026-04-09T12:55:00Z
7
value 0.00829
scoring_system epss
scoring_elements 0.74544
published_at 2026-04-11T12:55:00Z
8
value 0.00829
scoring_system epss
scoring_elements 0.74525
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1079851
reference_id 1079851
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1079851
7
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-45
reference_id mfsa2014-45
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-45
9
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
10
reference_url https://access.redhat.com/errata/RHSA-2014:1073
reference_id RHSA-2014:1073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1073
11
reference_url https://access.redhat.com/errata/RHSA-2014:1246
reference_id RHSA-2014:1246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1246
12
reference_url https://usn.ubuntu.com/2159-1/
reference_id USN-2159-1
reference_type
scores
url https://usn.ubuntu.com/2159-1/
13
reference_url https://usn.ubuntu.com/2185-1/
reference_id USN-2185-1
reference_type
scores
url https://usn.ubuntu.com/2185-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
purl pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ert-2qyc-cfc1
1
vulnerability VCID-2w58-mdmk-guh8
2
vulnerability VCID-2w9f-avet-g7c5
3
vulnerability VCID-2zrv-q4tb-wqeg
4
vulnerability VCID-46cy-x3cp-tke5
5
vulnerability VCID-5wqt-2dtu-8qa4
6
vulnerability VCID-6fvj-phnx-kfgs
7
vulnerability VCID-7msj-wyd6-zkbe
8
vulnerability VCID-8j3v-g9xv-gud5
9
vulnerability VCID-8qtg-h4km-bfg2
10
vulnerability VCID-9mux-fuyc-a7dx
11
vulnerability VCID-b3mt-3nfn-suc1
12
vulnerability VCID-cgvg-aj53-kkbp
13
vulnerability VCID-dh3c-g3k3-zkb7
14
vulnerability VCID-dk4z-1j37-aucx
15
vulnerability VCID-dtrc-mwu9-2bdf
16
vulnerability VCID-ekxy-vaed-u7cg
17
vulnerability VCID-ewe9-39b1-kba2
18
vulnerability VCID-fgv4-bz59-h7g7
19
vulnerability VCID-gfj6-dsud-g3fh
20
vulnerability VCID-hs5f-21nx-gfeb
21
vulnerability VCID-hs79-pemh-vfd6
22
vulnerability VCID-jm5w-6pdb-bbes
23
vulnerability VCID-jmhk-12t1-kugh
24
vulnerability VCID-jrsz-ynp7-wbb2
25
vulnerability VCID-jvrr-2gej-bfby
26
vulnerability VCID-k2s2-zkua-8ydy
27
vulnerability VCID-k4a4-f1as-x3bj
28
vulnerability VCID-kxvg-qw8v-vydv
29
vulnerability VCID-mwjm-p7pr-kfhj
30
vulnerability VCID-mwyu-5rk2-xbbz
31
vulnerability VCID-mx8t-s47w-wud5
32
vulnerability VCID-paez-g9wh-mfeq
33
vulnerability VCID-pc13-zwmr-p7hz
34
vulnerability VCID-qdev-8m9n-8bbr
35
vulnerability VCID-qdqz-admy-e7cg
36
vulnerability VCID-qup9-qy11-fqhe
37
vulnerability VCID-rk7t-zjzg-eqar
38
vulnerability VCID-rzqy-gheq-cqgg
39
vulnerability VCID-sucm-cq7u-r3en
40
vulnerability VCID-szzk-wxm2-cfgj
41
vulnerability VCID-t89f-eksr-juen
42
vulnerability VCID-ukuz-m6d3-5kab
43
vulnerability VCID-uqv9-vr1q-6ya1
44
vulnerability VCID-uzt2-tufb-rua5
45
vulnerability VCID-vjas-pry4-93cz
46
vulnerability VCID-vszp-vyxy-f7g7
47
vulnerability VCID-vzb9-aeqz-hybr
48
vulnerability VCID-w5wp-ujx1-vkhp
49
vulnerability VCID-w794-gqex-83du
50
vulnerability VCID-wavp-f4kn-j3cm
51
vulnerability VCID-wut5-sqr6-mubd
52
vulnerability VCID-x1ty-wqph-gkak
53
vulnerability VCID-xap5-djda-2uem
54
vulnerability VCID-y43f-tmvr-hqas
55
vulnerability VCID-ykkw-a6a1-43fe
56
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.5-1%252Bdeb7u5
1
url pkg:deb/debian/nss@2:3.17.2-1.1
purl pkg:deb/debian/nss@2:3.17.2-1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w58-mdmk-guh8
1
vulnerability VCID-2w9f-avet-g7c5
2
vulnerability VCID-2zrv-q4tb-wqeg
3
vulnerability VCID-46cy-x3cp-tke5
4
vulnerability VCID-5wqt-2dtu-8qa4
5
vulnerability VCID-6fvj-phnx-kfgs
6
vulnerability VCID-7msj-wyd6-zkbe
7
vulnerability VCID-8qtg-h4km-bfg2
8
vulnerability VCID-9mux-fuyc-a7dx
9
vulnerability VCID-cgvg-aj53-kkbp
10
vulnerability VCID-dh3c-g3k3-zkb7
11
vulnerability VCID-dk4z-1j37-aucx
12
vulnerability VCID-ekxy-vaed-u7cg
13
vulnerability VCID-ewe9-39b1-kba2
14
vulnerability VCID-fgv4-bz59-h7g7
15
vulnerability VCID-gfj6-dsud-g3fh
16
vulnerability VCID-hs5f-21nx-gfeb
17
vulnerability VCID-hs79-pemh-vfd6
18
vulnerability VCID-jmhk-12t1-kugh
19
vulnerability VCID-jrsz-ynp7-wbb2
20
vulnerability VCID-jvrr-2gej-bfby
21
vulnerability VCID-k2s2-zkua-8ydy
22
vulnerability VCID-k4a4-f1as-x3bj
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-mwyu-5rk2-xbbz
25
vulnerability VCID-mx8t-s47w-wud5
26
vulnerability VCID-paez-g9wh-mfeq
27
vulnerability VCID-pc13-zwmr-p7hz
28
vulnerability VCID-qup9-qy11-fqhe
29
vulnerability VCID-rk7t-zjzg-eqar
30
vulnerability VCID-rzqy-gheq-cqgg
31
vulnerability VCID-szzk-wxm2-cfgj
32
vulnerability VCID-t89f-eksr-juen
33
vulnerability VCID-ukuz-m6d3-5kab
34
vulnerability VCID-vjas-pry4-93cz
35
vulnerability VCID-vszp-vyxy-f7g7
36
vulnerability VCID-vzb9-aeqz-hybr
37
vulnerability VCID-w794-gqex-83du
38
vulnerability VCID-wavp-f4kn-j3cm
39
vulnerability VCID-wut5-sqr6-mubd
40
vulnerability VCID-x1ty-wqph-gkak
41
vulnerability VCID-y43f-tmvr-hqas
42
vulnerability VCID-ykkw-a6a1-43fe
43
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1
aliases CVE-2014-1492
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ert-2qyc-cfc1
1
url VCID-8j3v-g9xv-gud5
vulnerability_id VCID-8j3v-g9xv-gud5
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1741.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1741.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1741
reference_id
reference_type
scores
0
value 0.02604
scoring_system epss
scoring_elements 0.85622
published_at 2026-04-13T12:55:00Z
1
value 0.02604
scoring_system epss
scoring_elements 0.8555
published_at 2026-04-01T12:55:00Z
2
value 0.02604
scoring_system epss
scoring_elements 0.85563
published_at 2026-04-02T12:55:00Z
3
value 0.02604
scoring_system epss
scoring_elements 0.8558
published_at 2026-04-04T12:55:00Z
4
value 0.02604
scoring_system epss
scoring_elements 0.85585
published_at 2026-04-07T12:55:00Z
5
value 0.02604
scoring_system epss
scoring_elements 0.85605
published_at 2026-04-08T12:55:00Z
6
value 0.02604
scoring_system epss
scoring_elements 0.85616
published_at 2026-04-09T12:55:00Z
7
value 0.02604
scoring_system epss
scoring_elements 0.8563
published_at 2026-04-11T12:55:00Z
8
value 0.02604
scoring_system epss
scoring_elements 0.85626
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1741
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1031458
reference_id 1031458
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1031458
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105
reference_id 735105
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105
8
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
9
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
reference_id mfsa2013-103
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
11
reference_url https://access.redhat.com/errata/RHSA-2013:1791
reference_id RHSA-2013:1791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1791
12
reference_url https://access.redhat.com/errata/RHSA-2013:1829
reference_id RHSA-2013:1829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1829
13
reference_url https://usn.ubuntu.com/2030-1/
reference_id USN-2030-1
reference_type
scores
url https://usn.ubuntu.com/2030-1/
14
reference_url https://usn.ubuntu.com/2031-1/
reference_id USN-2031-1
reference_type
scores
url https://usn.ubuntu.com/2031-1/
15
reference_url https://usn.ubuntu.com/2032-1/
reference_id USN-2032-1
reference_type
scores
url https://usn.ubuntu.com/2032-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
purl pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ert-2qyc-cfc1
1
vulnerability VCID-2w58-mdmk-guh8
2
vulnerability VCID-2w9f-avet-g7c5
3
vulnerability VCID-2zrv-q4tb-wqeg
4
vulnerability VCID-46cy-x3cp-tke5
5
vulnerability VCID-5wqt-2dtu-8qa4
6
vulnerability VCID-6fvj-phnx-kfgs
7
vulnerability VCID-7msj-wyd6-zkbe
8
vulnerability VCID-8j3v-g9xv-gud5
9
vulnerability VCID-8qtg-h4km-bfg2
10
vulnerability VCID-9mux-fuyc-a7dx
11
vulnerability VCID-b3mt-3nfn-suc1
12
vulnerability VCID-cgvg-aj53-kkbp
13
vulnerability VCID-dh3c-g3k3-zkb7
14
vulnerability VCID-dk4z-1j37-aucx
15
vulnerability VCID-dtrc-mwu9-2bdf
16
vulnerability VCID-ekxy-vaed-u7cg
17
vulnerability VCID-ewe9-39b1-kba2
18
vulnerability VCID-fgv4-bz59-h7g7
19
vulnerability VCID-gfj6-dsud-g3fh
20
vulnerability VCID-hs5f-21nx-gfeb
21
vulnerability VCID-hs79-pemh-vfd6
22
vulnerability VCID-jm5w-6pdb-bbes
23
vulnerability VCID-jmhk-12t1-kugh
24
vulnerability VCID-jrsz-ynp7-wbb2
25
vulnerability VCID-jvrr-2gej-bfby
26
vulnerability VCID-k2s2-zkua-8ydy
27
vulnerability VCID-k4a4-f1as-x3bj
28
vulnerability VCID-kxvg-qw8v-vydv
29
vulnerability VCID-mwjm-p7pr-kfhj
30
vulnerability VCID-mwyu-5rk2-xbbz
31
vulnerability VCID-mx8t-s47w-wud5
32
vulnerability VCID-paez-g9wh-mfeq
33
vulnerability VCID-pc13-zwmr-p7hz
34
vulnerability VCID-qdev-8m9n-8bbr
35
vulnerability VCID-qdqz-admy-e7cg
36
vulnerability VCID-qup9-qy11-fqhe
37
vulnerability VCID-rk7t-zjzg-eqar
38
vulnerability VCID-rzqy-gheq-cqgg
39
vulnerability VCID-sucm-cq7u-r3en
40
vulnerability VCID-szzk-wxm2-cfgj
41
vulnerability VCID-t89f-eksr-juen
42
vulnerability VCID-ukuz-m6d3-5kab
43
vulnerability VCID-uqv9-vr1q-6ya1
44
vulnerability VCID-uzt2-tufb-rua5
45
vulnerability VCID-vjas-pry4-93cz
46
vulnerability VCID-vszp-vyxy-f7g7
47
vulnerability VCID-vzb9-aeqz-hybr
48
vulnerability VCID-w5wp-ujx1-vkhp
49
vulnerability VCID-w794-gqex-83du
50
vulnerability VCID-wavp-f4kn-j3cm
51
vulnerability VCID-wut5-sqr6-mubd
52
vulnerability VCID-x1ty-wqph-gkak
53
vulnerability VCID-xap5-djda-2uem
54
vulnerability VCID-y43f-tmvr-hqas
55
vulnerability VCID-ykkw-a6a1-43fe
56
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.5-1%252Bdeb7u5
1
url pkg:deb/debian/nss@2:3.17.2-1.1
purl pkg:deb/debian/nss@2:3.17.2-1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w58-mdmk-guh8
1
vulnerability VCID-2w9f-avet-g7c5
2
vulnerability VCID-2zrv-q4tb-wqeg
3
vulnerability VCID-46cy-x3cp-tke5
4
vulnerability VCID-5wqt-2dtu-8qa4
5
vulnerability VCID-6fvj-phnx-kfgs
6
vulnerability VCID-7msj-wyd6-zkbe
7
vulnerability VCID-8qtg-h4km-bfg2
8
vulnerability VCID-9mux-fuyc-a7dx
9
vulnerability VCID-cgvg-aj53-kkbp
10
vulnerability VCID-dh3c-g3k3-zkb7
11
vulnerability VCID-dk4z-1j37-aucx
12
vulnerability VCID-ekxy-vaed-u7cg
13
vulnerability VCID-ewe9-39b1-kba2
14
vulnerability VCID-fgv4-bz59-h7g7
15
vulnerability VCID-gfj6-dsud-g3fh
16
vulnerability VCID-hs5f-21nx-gfeb
17
vulnerability VCID-hs79-pemh-vfd6
18
vulnerability VCID-jmhk-12t1-kugh
19
vulnerability VCID-jrsz-ynp7-wbb2
20
vulnerability VCID-jvrr-2gej-bfby
21
vulnerability VCID-k2s2-zkua-8ydy
22
vulnerability VCID-k4a4-f1as-x3bj
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-mwyu-5rk2-xbbz
25
vulnerability VCID-mx8t-s47w-wud5
26
vulnerability VCID-paez-g9wh-mfeq
27
vulnerability VCID-pc13-zwmr-p7hz
28
vulnerability VCID-qup9-qy11-fqhe
29
vulnerability VCID-rk7t-zjzg-eqar
30
vulnerability VCID-rzqy-gheq-cqgg
31
vulnerability VCID-szzk-wxm2-cfgj
32
vulnerability VCID-t89f-eksr-juen
33
vulnerability VCID-ukuz-m6d3-5kab
34
vulnerability VCID-vjas-pry4-93cz
35
vulnerability VCID-vszp-vyxy-f7g7
36
vulnerability VCID-vzb9-aeqz-hybr
37
vulnerability VCID-w794-gqex-83du
38
vulnerability VCID-wavp-f4kn-j3cm
39
vulnerability VCID-wut5-sqr6-mubd
40
vulnerability VCID-x1ty-wqph-gkak
41
vulnerability VCID-y43f-tmvr-hqas
42
vulnerability VCID-ykkw-a6a1-43fe
43
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1
aliases CVE-2013-1741
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8j3v-g9xv-gud5
2
url VCID-b3mt-3nfn-suc1
vulnerability_id VCID-b3mt-3nfn-suc1
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1490.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1490
reference_id
reference_type
scores
0
value 0.01567
scoring_system epss
scoring_elements 0.81519
published_at 2026-04-12T12:55:00Z
1
value 0.01567
scoring_system epss
scoring_elements 0.81448
published_at 2026-04-01T12:55:00Z
2
value 0.01567
scoring_system epss
scoring_elements 0.81459
published_at 2026-04-02T12:55:00Z
3
value 0.01567
scoring_system epss
scoring_elements 0.81481
published_at 2026-04-04T12:55:00Z
4
value 0.01567
scoring_system epss
scoring_elements 0.81479
published_at 2026-04-07T12:55:00Z
5
value 0.01567
scoring_system epss
scoring_elements 0.81506
published_at 2026-04-08T12:55:00Z
6
value 0.01567
scoring_system epss
scoring_elements 0.81512
published_at 2026-04-13T12:55:00Z
7
value 0.01567
scoring_system epss
scoring_elements 0.81532
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060953
reference_id 1060953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060953
11
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
reference_id mfsa2014-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
13
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
14
reference_url https://access.redhat.com/errata/RHSA-2014:1246
reference_id RHSA-2014:1246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1246
15
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
16
reference_url https://usn.ubuntu.com/2119-1/
reference_id USN-2119-1
reference_type
scores
url https://usn.ubuntu.com/2119-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.17.2-1.1
purl pkg:deb/debian/nss@2:3.17.2-1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w58-mdmk-guh8
1
vulnerability VCID-2w9f-avet-g7c5
2
vulnerability VCID-2zrv-q4tb-wqeg
3
vulnerability VCID-46cy-x3cp-tke5
4
vulnerability VCID-5wqt-2dtu-8qa4
5
vulnerability VCID-6fvj-phnx-kfgs
6
vulnerability VCID-7msj-wyd6-zkbe
7
vulnerability VCID-8qtg-h4km-bfg2
8
vulnerability VCID-9mux-fuyc-a7dx
9
vulnerability VCID-cgvg-aj53-kkbp
10
vulnerability VCID-dh3c-g3k3-zkb7
11
vulnerability VCID-dk4z-1j37-aucx
12
vulnerability VCID-ekxy-vaed-u7cg
13
vulnerability VCID-ewe9-39b1-kba2
14
vulnerability VCID-fgv4-bz59-h7g7
15
vulnerability VCID-gfj6-dsud-g3fh
16
vulnerability VCID-hs5f-21nx-gfeb
17
vulnerability VCID-hs79-pemh-vfd6
18
vulnerability VCID-jmhk-12t1-kugh
19
vulnerability VCID-jrsz-ynp7-wbb2
20
vulnerability VCID-jvrr-2gej-bfby
21
vulnerability VCID-k2s2-zkua-8ydy
22
vulnerability VCID-k4a4-f1as-x3bj
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-mwyu-5rk2-xbbz
25
vulnerability VCID-mx8t-s47w-wud5
26
vulnerability VCID-paez-g9wh-mfeq
27
vulnerability VCID-pc13-zwmr-p7hz
28
vulnerability VCID-qup9-qy11-fqhe
29
vulnerability VCID-rk7t-zjzg-eqar
30
vulnerability VCID-rzqy-gheq-cqgg
31
vulnerability VCID-szzk-wxm2-cfgj
32
vulnerability VCID-t89f-eksr-juen
33
vulnerability VCID-ukuz-m6d3-5kab
34
vulnerability VCID-vjas-pry4-93cz
35
vulnerability VCID-vszp-vyxy-f7g7
36
vulnerability VCID-vzb9-aeqz-hybr
37
vulnerability VCID-w794-gqex-83du
38
vulnerability VCID-wavp-f4kn-j3cm
39
vulnerability VCID-wut5-sqr6-mubd
40
vulnerability VCID-x1ty-wqph-gkak
41
vulnerability VCID-y43f-tmvr-hqas
42
vulnerability VCID-ykkw-a6a1-43fe
43
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1
aliases CVE-2014-1490
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3mt-3nfn-suc1
3
url VCID-dtrc-mwu9-2bdf
vulnerability_id VCID-dtrc-mwu9-2bdf
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5605.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5605.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5605
reference_id
reference_type
scores
0
value 0.0279
scoring_system epss
scoring_elements 0.86084
published_at 2026-04-13T12:55:00Z
1
value 0.0279
scoring_system epss
scoring_elements 0.8602
published_at 2026-04-01T12:55:00Z
2
value 0.0279
scoring_system epss
scoring_elements 0.86031
published_at 2026-04-02T12:55:00Z
3
value 0.0279
scoring_system epss
scoring_elements 0.86048
published_at 2026-04-07T12:55:00Z
4
value 0.0279
scoring_system epss
scoring_elements 0.86067
published_at 2026-04-08T12:55:00Z
5
value 0.0279
scoring_system epss
scoring_elements 0.86077
published_at 2026-04-09T12:55:00Z
6
value 0.0279
scoring_system epss
scoring_elements 0.86092
published_at 2026-04-11T12:55:00Z
7
value 0.0279
scoring_system epss
scoring_elements 0.86089
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5605
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1030807
reference_id 1030807
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1030807
4
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
5
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
reference_id mfsa2013-103
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
7
reference_url https://access.redhat.com/errata/RHSA-2013:1791
reference_id RHSA-2013:1791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1791
8
reference_url https://access.redhat.com/errata/RHSA-2013:1829
reference_id RHSA-2013:1829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1829
9
reference_url https://access.redhat.com/errata/RHSA-2013:1840
reference_id RHSA-2013:1840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1840
10
reference_url https://access.redhat.com/errata/RHSA-2013:1841
reference_id RHSA-2013:1841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1841
11
reference_url https://access.redhat.com/errata/RHSA-2014:0041
reference_id RHSA-2014:0041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0041
12
reference_url https://usn.ubuntu.com/2030-1/
reference_id USN-2030-1
reference_type
scores
url https://usn.ubuntu.com/2030-1/
13
reference_url https://usn.ubuntu.com/2031-1/
reference_id USN-2031-1
reference_type
scores
url https://usn.ubuntu.com/2031-1/
14
reference_url https://usn.ubuntu.com/2032-1/
reference_id USN-2032-1
reference_type
scores
url https://usn.ubuntu.com/2032-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
purl pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ert-2qyc-cfc1
1
vulnerability VCID-2w58-mdmk-guh8
2
vulnerability VCID-2w9f-avet-g7c5
3
vulnerability VCID-2zrv-q4tb-wqeg
4
vulnerability VCID-46cy-x3cp-tke5
5
vulnerability VCID-5wqt-2dtu-8qa4
6
vulnerability VCID-6fvj-phnx-kfgs
7
vulnerability VCID-7msj-wyd6-zkbe
8
vulnerability VCID-8j3v-g9xv-gud5
9
vulnerability VCID-8qtg-h4km-bfg2
10
vulnerability VCID-9mux-fuyc-a7dx
11
vulnerability VCID-b3mt-3nfn-suc1
12
vulnerability VCID-cgvg-aj53-kkbp
13
vulnerability VCID-dh3c-g3k3-zkb7
14
vulnerability VCID-dk4z-1j37-aucx
15
vulnerability VCID-dtrc-mwu9-2bdf
16
vulnerability VCID-ekxy-vaed-u7cg
17
vulnerability VCID-ewe9-39b1-kba2
18
vulnerability VCID-fgv4-bz59-h7g7
19
vulnerability VCID-gfj6-dsud-g3fh
20
vulnerability VCID-hs5f-21nx-gfeb
21
vulnerability VCID-hs79-pemh-vfd6
22
vulnerability VCID-jm5w-6pdb-bbes
23
vulnerability VCID-jmhk-12t1-kugh
24
vulnerability VCID-jrsz-ynp7-wbb2
25
vulnerability VCID-jvrr-2gej-bfby
26
vulnerability VCID-k2s2-zkua-8ydy
27
vulnerability VCID-k4a4-f1as-x3bj
28
vulnerability VCID-kxvg-qw8v-vydv
29
vulnerability VCID-mwjm-p7pr-kfhj
30
vulnerability VCID-mwyu-5rk2-xbbz
31
vulnerability VCID-mx8t-s47w-wud5
32
vulnerability VCID-paez-g9wh-mfeq
33
vulnerability VCID-pc13-zwmr-p7hz
34
vulnerability VCID-qdev-8m9n-8bbr
35
vulnerability VCID-qdqz-admy-e7cg
36
vulnerability VCID-qup9-qy11-fqhe
37
vulnerability VCID-rk7t-zjzg-eqar
38
vulnerability VCID-rzqy-gheq-cqgg
39
vulnerability VCID-sucm-cq7u-r3en
40
vulnerability VCID-szzk-wxm2-cfgj
41
vulnerability VCID-t89f-eksr-juen
42
vulnerability VCID-ukuz-m6d3-5kab
43
vulnerability VCID-uqv9-vr1q-6ya1
44
vulnerability VCID-uzt2-tufb-rua5
45
vulnerability VCID-vjas-pry4-93cz
46
vulnerability VCID-vszp-vyxy-f7g7
47
vulnerability VCID-vzb9-aeqz-hybr
48
vulnerability VCID-w5wp-ujx1-vkhp
49
vulnerability VCID-w794-gqex-83du
50
vulnerability VCID-wavp-f4kn-j3cm
51
vulnerability VCID-wut5-sqr6-mubd
52
vulnerability VCID-x1ty-wqph-gkak
53
vulnerability VCID-xap5-djda-2uem
54
vulnerability VCID-y43f-tmvr-hqas
55
vulnerability VCID-ykkw-a6a1-43fe
56
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.5-1%252Bdeb7u5
1
url pkg:deb/debian/nss@2:3.17.2-1.1
purl pkg:deb/debian/nss@2:3.17.2-1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w58-mdmk-guh8
1
vulnerability VCID-2w9f-avet-g7c5
2
vulnerability VCID-2zrv-q4tb-wqeg
3
vulnerability VCID-46cy-x3cp-tke5
4
vulnerability VCID-5wqt-2dtu-8qa4
5
vulnerability VCID-6fvj-phnx-kfgs
6
vulnerability VCID-7msj-wyd6-zkbe
7
vulnerability VCID-8qtg-h4km-bfg2
8
vulnerability VCID-9mux-fuyc-a7dx
9
vulnerability VCID-cgvg-aj53-kkbp
10
vulnerability VCID-dh3c-g3k3-zkb7
11
vulnerability VCID-dk4z-1j37-aucx
12
vulnerability VCID-ekxy-vaed-u7cg
13
vulnerability VCID-ewe9-39b1-kba2
14
vulnerability VCID-fgv4-bz59-h7g7
15
vulnerability VCID-gfj6-dsud-g3fh
16
vulnerability VCID-hs5f-21nx-gfeb
17
vulnerability VCID-hs79-pemh-vfd6
18
vulnerability VCID-jmhk-12t1-kugh
19
vulnerability VCID-jrsz-ynp7-wbb2
20
vulnerability VCID-jvrr-2gej-bfby
21
vulnerability VCID-k2s2-zkua-8ydy
22
vulnerability VCID-k4a4-f1as-x3bj
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-mwyu-5rk2-xbbz
25
vulnerability VCID-mx8t-s47w-wud5
26
vulnerability VCID-paez-g9wh-mfeq
27
vulnerability VCID-pc13-zwmr-p7hz
28
vulnerability VCID-qup9-qy11-fqhe
29
vulnerability VCID-rk7t-zjzg-eqar
30
vulnerability VCID-rzqy-gheq-cqgg
31
vulnerability VCID-szzk-wxm2-cfgj
32
vulnerability VCID-t89f-eksr-juen
33
vulnerability VCID-ukuz-m6d3-5kab
34
vulnerability VCID-vjas-pry4-93cz
35
vulnerability VCID-vszp-vyxy-f7g7
36
vulnerability VCID-vzb9-aeqz-hybr
37
vulnerability VCID-w794-gqex-83du
38
vulnerability VCID-wavp-f4kn-j3cm
39
vulnerability VCID-wut5-sqr6-mubd
40
vulnerability VCID-x1ty-wqph-gkak
41
vulnerability VCID-y43f-tmvr-hqas
42
vulnerability VCID-ykkw-a6a1-43fe
43
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1
aliases CVE-2013-5605
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dtrc-mwu9-2bdf
4
url VCID-jm5w-6pdb-bbes
vulnerability_id VCID-jm5w-6pdb-bbes
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5606.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5606
reference_id
reference_type
scores
0
value 0.00661
scoring_system epss
scoring_elements 0.71141
published_at 2026-04-13T12:55:00Z
1
value 0.00661
scoring_system epss
scoring_elements 0.71092
published_at 2026-04-01T12:55:00Z
2
value 0.00661
scoring_system epss
scoring_elements 0.71101
published_at 2026-04-02T12:55:00Z
3
value 0.00661
scoring_system epss
scoring_elements 0.71119
published_at 2026-04-04T12:55:00Z
4
value 0.00661
scoring_system epss
scoring_elements 0.71094
published_at 2026-04-07T12:55:00Z
5
value 0.00661
scoring_system epss
scoring_elements 0.71136
published_at 2026-04-08T12:55:00Z
6
value 0.00661
scoring_system epss
scoring_elements 0.71148
published_at 2026-04-09T12:55:00Z
7
value 0.00661
scoring_system epss
scoring_elements 0.71172
published_at 2026-04-11T12:55:00Z
8
value 0.00661
scoring_system epss
scoring_elements 0.71157
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5606
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1031457
reference_id 1031457
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1031457
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105
reference_id 735105
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105
8
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
9
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
reference_id mfsa2013-103
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-103
11
reference_url https://access.redhat.com/errata/RHSA-2013:1791
reference_id RHSA-2013:1791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1791
12
reference_url https://access.redhat.com/errata/RHSA-2013:1829
reference_id RHSA-2013:1829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1829
13
reference_url https://access.redhat.com/errata/RHSA-2014:0041
reference_id RHSA-2014:0041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0041
14
reference_url https://usn.ubuntu.com/2030-1/
reference_id USN-2030-1
reference_type
scores
url https://usn.ubuntu.com/2030-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
purl pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ert-2qyc-cfc1
1
vulnerability VCID-2w58-mdmk-guh8
2
vulnerability VCID-2w9f-avet-g7c5
3
vulnerability VCID-2zrv-q4tb-wqeg
4
vulnerability VCID-46cy-x3cp-tke5
5
vulnerability VCID-5wqt-2dtu-8qa4
6
vulnerability VCID-6fvj-phnx-kfgs
7
vulnerability VCID-7msj-wyd6-zkbe
8
vulnerability VCID-8j3v-g9xv-gud5
9
vulnerability VCID-8qtg-h4km-bfg2
10
vulnerability VCID-9mux-fuyc-a7dx
11
vulnerability VCID-b3mt-3nfn-suc1
12
vulnerability VCID-cgvg-aj53-kkbp
13
vulnerability VCID-dh3c-g3k3-zkb7
14
vulnerability VCID-dk4z-1j37-aucx
15
vulnerability VCID-dtrc-mwu9-2bdf
16
vulnerability VCID-ekxy-vaed-u7cg
17
vulnerability VCID-ewe9-39b1-kba2
18
vulnerability VCID-fgv4-bz59-h7g7
19
vulnerability VCID-gfj6-dsud-g3fh
20
vulnerability VCID-hs5f-21nx-gfeb
21
vulnerability VCID-hs79-pemh-vfd6
22
vulnerability VCID-jm5w-6pdb-bbes
23
vulnerability VCID-jmhk-12t1-kugh
24
vulnerability VCID-jrsz-ynp7-wbb2
25
vulnerability VCID-jvrr-2gej-bfby
26
vulnerability VCID-k2s2-zkua-8ydy
27
vulnerability VCID-k4a4-f1as-x3bj
28
vulnerability VCID-kxvg-qw8v-vydv
29
vulnerability VCID-mwjm-p7pr-kfhj
30
vulnerability VCID-mwyu-5rk2-xbbz
31
vulnerability VCID-mx8t-s47w-wud5
32
vulnerability VCID-paez-g9wh-mfeq
33
vulnerability VCID-pc13-zwmr-p7hz
34
vulnerability VCID-qdev-8m9n-8bbr
35
vulnerability VCID-qdqz-admy-e7cg
36
vulnerability VCID-qup9-qy11-fqhe
37
vulnerability VCID-rk7t-zjzg-eqar
38
vulnerability VCID-rzqy-gheq-cqgg
39
vulnerability VCID-sucm-cq7u-r3en
40
vulnerability VCID-szzk-wxm2-cfgj
41
vulnerability VCID-t89f-eksr-juen
42
vulnerability VCID-ukuz-m6d3-5kab
43
vulnerability VCID-uqv9-vr1q-6ya1
44
vulnerability VCID-uzt2-tufb-rua5
45
vulnerability VCID-vjas-pry4-93cz
46
vulnerability VCID-vszp-vyxy-f7g7
47
vulnerability VCID-vzb9-aeqz-hybr
48
vulnerability VCID-w5wp-ujx1-vkhp
49
vulnerability VCID-w794-gqex-83du
50
vulnerability VCID-wavp-f4kn-j3cm
51
vulnerability VCID-wut5-sqr6-mubd
52
vulnerability VCID-x1ty-wqph-gkak
53
vulnerability VCID-xap5-djda-2uem
54
vulnerability VCID-y43f-tmvr-hqas
55
vulnerability VCID-ykkw-a6a1-43fe
56
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.5-1%252Bdeb7u5
1
url pkg:deb/debian/nss@2:3.17.2-1.1
purl pkg:deb/debian/nss@2:3.17.2-1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w58-mdmk-guh8
1
vulnerability VCID-2w9f-avet-g7c5
2
vulnerability VCID-2zrv-q4tb-wqeg
3
vulnerability VCID-46cy-x3cp-tke5
4
vulnerability VCID-5wqt-2dtu-8qa4
5
vulnerability VCID-6fvj-phnx-kfgs
6
vulnerability VCID-7msj-wyd6-zkbe
7
vulnerability VCID-8qtg-h4km-bfg2
8
vulnerability VCID-9mux-fuyc-a7dx
9
vulnerability VCID-cgvg-aj53-kkbp
10
vulnerability VCID-dh3c-g3k3-zkb7
11
vulnerability VCID-dk4z-1j37-aucx
12
vulnerability VCID-ekxy-vaed-u7cg
13
vulnerability VCID-ewe9-39b1-kba2
14
vulnerability VCID-fgv4-bz59-h7g7
15
vulnerability VCID-gfj6-dsud-g3fh
16
vulnerability VCID-hs5f-21nx-gfeb
17
vulnerability VCID-hs79-pemh-vfd6
18
vulnerability VCID-jmhk-12t1-kugh
19
vulnerability VCID-jrsz-ynp7-wbb2
20
vulnerability VCID-jvrr-2gej-bfby
21
vulnerability VCID-k2s2-zkua-8ydy
22
vulnerability VCID-k4a4-f1as-x3bj
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-mwyu-5rk2-xbbz
25
vulnerability VCID-mx8t-s47w-wud5
26
vulnerability VCID-paez-g9wh-mfeq
27
vulnerability VCID-pc13-zwmr-p7hz
28
vulnerability VCID-qup9-qy11-fqhe
29
vulnerability VCID-rk7t-zjzg-eqar
30
vulnerability VCID-rzqy-gheq-cqgg
31
vulnerability VCID-szzk-wxm2-cfgj
32
vulnerability VCID-t89f-eksr-juen
33
vulnerability VCID-ukuz-m6d3-5kab
34
vulnerability VCID-vjas-pry4-93cz
35
vulnerability VCID-vszp-vyxy-f7g7
36
vulnerability VCID-vzb9-aeqz-hybr
37
vulnerability VCID-w794-gqex-83du
38
vulnerability VCID-wavp-f4kn-j3cm
39
vulnerability VCID-wut5-sqr6-mubd
40
vulnerability VCID-x1ty-wqph-gkak
41
vulnerability VCID-y43f-tmvr-hqas
42
vulnerability VCID-ykkw-a6a1-43fe
43
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1
aliases CVE-2013-5606
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jm5w-6pdb-bbes
5
url VCID-mwjm-p7pr-kfhj
vulnerability_id VCID-mwjm-p7pr-kfhj
summary nss: false start PR_Recv information disclosure security issue
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1740.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1740
reference_id
reference_type
scores
0
value 0.01001
scoring_system epss
scoring_elements 0.76939
published_at 2026-04-01T12:55:00Z
1
value 0.01001
scoring_system epss
scoring_elements 0.76945
published_at 2026-04-02T12:55:00Z
2
value 0.01001
scoring_system epss
scoring_elements 0.76975
published_at 2026-04-04T12:55:00Z
3
value 0.01001
scoring_system epss
scoring_elements 0.76957
published_at 2026-04-07T12:55:00Z
4
value 0.01001
scoring_system epss
scoring_elements 0.76988
published_at 2026-04-08T12:55:00Z
5
value 0.01001
scoring_system epss
scoring_elements 0.77
published_at 2026-04-09T12:55:00Z
6
value 0.01001
scoring_system epss
scoring_elements 0.77027
published_at 2026-04-11T12:55:00Z
7
value 0.01001
scoring_system epss
scoring_elements 0.77006
published_at 2026-04-12T12:55:00Z
8
value 0.01001
scoring_system epss
scoring_elements 0.77002
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1740
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1053725
reference_id 1053725
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1053725
4
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
5
reference_url https://access.redhat.com/errata/RHSA-2014:1246
reference_id RHSA-2014:1246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1246
6
reference_url https://usn.ubuntu.com/2088-1/
reference_id USN-2088-1
reference_type
scores
url https://usn.ubuntu.com/2088-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.17.2-1.1
purl pkg:deb/debian/nss@2:3.17.2-1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w58-mdmk-guh8
1
vulnerability VCID-2w9f-avet-g7c5
2
vulnerability VCID-2zrv-q4tb-wqeg
3
vulnerability VCID-46cy-x3cp-tke5
4
vulnerability VCID-5wqt-2dtu-8qa4
5
vulnerability VCID-6fvj-phnx-kfgs
6
vulnerability VCID-7msj-wyd6-zkbe
7
vulnerability VCID-8qtg-h4km-bfg2
8
vulnerability VCID-9mux-fuyc-a7dx
9
vulnerability VCID-cgvg-aj53-kkbp
10
vulnerability VCID-dh3c-g3k3-zkb7
11
vulnerability VCID-dk4z-1j37-aucx
12
vulnerability VCID-ekxy-vaed-u7cg
13
vulnerability VCID-ewe9-39b1-kba2
14
vulnerability VCID-fgv4-bz59-h7g7
15
vulnerability VCID-gfj6-dsud-g3fh
16
vulnerability VCID-hs5f-21nx-gfeb
17
vulnerability VCID-hs79-pemh-vfd6
18
vulnerability VCID-jmhk-12t1-kugh
19
vulnerability VCID-jrsz-ynp7-wbb2
20
vulnerability VCID-jvrr-2gej-bfby
21
vulnerability VCID-k2s2-zkua-8ydy
22
vulnerability VCID-k4a4-f1as-x3bj
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-mwyu-5rk2-xbbz
25
vulnerability VCID-mx8t-s47w-wud5
26
vulnerability VCID-paez-g9wh-mfeq
27
vulnerability VCID-pc13-zwmr-p7hz
28
vulnerability VCID-qup9-qy11-fqhe
29
vulnerability VCID-rk7t-zjzg-eqar
30
vulnerability VCID-rzqy-gheq-cqgg
31
vulnerability VCID-szzk-wxm2-cfgj
32
vulnerability VCID-t89f-eksr-juen
33
vulnerability VCID-ukuz-m6d3-5kab
34
vulnerability VCID-vjas-pry4-93cz
35
vulnerability VCID-vszp-vyxy-f7g7
36
vulnerability VCID-vzb9-aeqz-hybr
37
vulnerability VCID-w794-gqex-83du
38
vulnerability VCID-wavp-f4kn-j3cm
39
vulnerability VCID-wut5-sqr6-mubd
40
vulnerability VCID-x1ty-wqph-gkak
41
vulnerability VCID-y43f-tmvr-hqas
42
vulnerability VCID-ykkw-a6a1-43fe
43
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1
aliases CVE-2013-1740
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwjm-p7pr-kfhj
6
url VCID-qdev-8m9n-8bbr
vulnerability_id VCID-qdev-8m9n-8bbr
summary security update
references
0
reference_url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html
1
reference_url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html
2
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
3
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-1307.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1307.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1354.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1354.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1371.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1371.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1568
reference_id
reference_type
scores
0
value 0.30935
scoring_system epss
scoring_elements 0.96737
published_at 2026-04-13T12:55:00Z
1
value 0.30935
scoring_system epss
scoring_elements 0.96722
published_at 2026-04-07T12:55:00Z
2
value 0.30935
scoring_system epss
scoring_elements 0.9673
published_at 2026-04-08T12:55:00Z
3
value 0.30935
scoring_system epss
scoring_elements 0.96731
published_at 2026-04-09T12:55:00Z
4
value 0.30935
scoring_system epss
scoring_elements 0.96734
published_at 2026-04-12T12:55:00Z
5
value 0.30935
scoring_system epss
scoring_elements 0.96718
published_at 2026-04-04T12:55:00Z
6
value 0.34437
scoring_system epss
scoring_elements 0.96962
published_at 2026-04-01T12:55:00Z
7
value 0.34437
scoring_system epss
scoring_elements 0.9697
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1568
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1064636
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1064636
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1069405
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1069405
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
15
reference_url http://secunia.com/advisories/61540
reference_id
reference_type
scores
url http://secunia.com/advisories/61540
16
reference_url http://secunia.com/advisories/61574
reference_id
reference_type
scores
url http://secunia.com/advisories/61574
17
reference_url http://secunia.com/advisories/61575
reference_id
reference_type
scores
url http://secunia.com/advisories/61575
18
reference_url http://secunia.com/advisories/61576
reference_id
reference_type
scores
url http://secunia.com/advisories/61576
19
reference_url http://secunia.com/advisories/61583
reference_id
reference_type
scores
url http://secunia.com/advisories/61583
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/96194
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/96194
21
reference_url http://www.debian.org/security/2014/dsa-3033
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3033
22
reference_url http://www.debian.org/security/2014/dsa-3034
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3034
23
reference_url http://www.debian.org/security/2014/dsa-3037
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3037
24
reference_url http://www.kb.cert.org/vuls/id/772676
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/772676
25
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-73.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-73.html
26
reference_url http://www.novell.com/support/kb/doc.php?id=7015701
reference_id
reference_type
scores
url http://www.novell.com/support/kb/doc.php?id=7015701
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
29
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
31
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
32
reference_url http://www.securityfocus.com/bid/70116
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70116
33
reference_url http://www.ubuntu.com/usn/USN-2360-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2360-1
34
reference_url http://www.ubuntu.com/usn/USN-2360-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2360-2
35
reference_url http://www.ubuntu.com/usn/USN-2361-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2361-1
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1145429
reference_id 1145429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1145429
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
242
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
243
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
244
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*
245
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*
246
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*
247
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*
248
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*
249
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*
250
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*
251
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*
252
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*
253
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*
254
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*
255
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*
256
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*
257
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*
258
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*
259
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*
260
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*
261
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*
262
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
263
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
264
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*
265
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*
266
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
267
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
268
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
269
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1568
reference_id CVE-2014-1568
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1568
270
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
271
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-73
reference_id mfsa2014-73
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-73
272
reference_url https://access.redhat.com/errata/RHSA-2014:1307
reference_id RHSA-2014:1307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1307
273
reference_url https://access.redhat.com/errata/RHSA-2014:1354
reference_id RHSA-2014:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1354
274
reference_url https://access.redhat.com/errata/RHSA-2014:1371
reference_id RHSA-2014:1371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1371
275
reference_url https://usn.ubuntu.com/2360-1/
reference_id USN-2360-1
reference_type
scores
url https://usn.ubuntu.com/2360-1/
276
reference_url https://usn.ubuntu.com/2360-2/
reference_id USN-2360-2
reference_type
scores
url https://usn.ubuntu.com/2360-2/
277
reference_url https://usn.ubuntu.com/2361-1/
reference_id USN-2361-1
reference_type
scores
url https://usn.ubuntu.com/2361-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
purl pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ert-2qyc-cfc1
1
vulnerability VCID-2w58-mdmk-guh8
2
vulnerability VCID-2w9f-avet-g7c5
3
vulnerability VCID-2zrv-q4tb-wqeg
4
vulnerability VCID-46cy-x3cp-tke5
5
vulnerability VCID-5wqt-2dtu-8qa4
6
vulnerability VCID-6fvj-phnx-kfgs
7
vulnerability VCID-7msj-wyd6-zkbe
8
vulnerability VCID-8j3v-g9xv-gud5
9
vulnerability VCID-8qtg-h4km-bfg2
10
vulnerability VCID-9mux-fuyc-a7dx
11
vulnerability VCID-b3mt-3nfn-suc1
12
vulnerability VCID-cgvg-aj53-kkbp
13
vulnerability VCID-dh3c-g3k3-zkb7
14
vulnerability VCID-dk4z-1j37-aucx
15
vulnerability VCID-dtrc-mwu9-2bdf
16
vulnerability VCID-ekxy-vaed-u7cg
17
vulnerability VCID-ewe9-39b1-kba2
18
vulnerability VCID-fgv4-bz59-h7g7
19
vulnerability VCID-gfj6-dsud-g3fh
20
vulnerability VCID-hs5f-21nx-gfeb
21
vulnerability VCID-hs79-pemh-vfd6
22
vulnerability VCID-jm5w-6pdb-bbes
23
vulnerability VCID-jmhk-12t1-kugh
24
vulnerability VCID-jrsz-ynp7-wbb2
25
vulnerability VCID-jvrr-2gej-bfby
26
vulnerability VCID-k2s2-zkua-8ydy
27
vulnerability VCID-k4a4-f1as-x3bj
28
vulnerability VCID-kxvg-qw8v-vydv
29
vulnerability VCID-mwjm-p7pr-kfhj
30
vulnerability VCID-mwyu-5rk2-xbbz
31
vulnerability VCID-mx8t-s47w-wud5
32
vulnerability VCID-paez-g9wh-mfeq
33
vulnerability VCID-pc13-zwmr-p7hz
34
vulnerability VCID-qdev-8m9n-8bbr
35
vulnerability VCID-qdqz-admy-e7cg
36
vulnerability VCID-qup9-qy11-fqhe
37
vulnerability VCID-rk7t-zjzg-eqar
38
vulnerability VCID-rzqy-gheq-cqgg
39
vulnerability VCID-sucm-cq7u-r3en
40
vulnerability VCID-szzk-wxm2-cfgj
41
vulnerability VCID-t89f-eksr-juen
42
vulnerability VCID-ukuz-m6d3-5kab
43
vulnerability VCID-uqv9-vr1q-6ya1
44
vulnerability VCID-uzt2-tufb-rua5
45
vulnerability VCID-vjas-pry4-93cz
46
vulnerability VCID-vszp-vyxy-f7g7
47
vulnerability VCID-vzb9-aeqz-hybr
48
vulnerability VCID-w5wp-ujx1-vkhp
49
vulnerability VCID-w794-gqex-83du
50
vulnerability VCID-wavp-f4kn-j3cm
51
vulnerability VCID-wut5-sqr6-mubd
52
vulnerability VCID-x1ty-wqph-gkak
53
vulnerability VCID-xap5-djda-2uem
54
vulnerability VCID-y43f-tmvr-hqas
55
vulnerability VCID-ykkw-a6a1-43fe
56
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.5-1%252Bdeb7u5
1
url pkg:deb/debian/nss@2:3.17.2-1.1
purl pkg:deb/debian/nss@2:3.17.2-1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w58-mdmk-guh8
1
vulnerability VCID-2w9f-avet-g7c5
2
vulnerability VCID-2zrv-q4tb-wqeg
3
vulnerability VCID-46cy-x3cp-tke5
4
vulnerability VCID-5wqt-2dtu-8qa4
5
vulnerability VCID-6fvj-phnx-kfgs
6
vulnerability VCID-7msj-wyd6-zkbe
7
vulnerability VCID-8qtg-h4km-bfg2
8
vulnerability VCID-9mux-fuyc-a7dx
9
vulnerability VCID-cgvg-aj53-kkbp
10
vulnerability VCID-dh3c-g3k3-zkb7
11
vulnerability VCID-dk4z-1j37-aucx
12
vulnerability VCID-ekxy-vaed-u7cg
13
vulnerability VCID-ewe9-39b1-kba2
14
vulnerability VCID-fgv4-bz59-h7g7
15
vulnerability VCID-gfj6-dsud-g3fh
16
vulnerability VCID-hs5f-21nx-gfeb
17
vulnerability VCID-hs79-pemh-vfd6
18
vulnerability VCID-jmhk-12t1-kugh
19
vulnerability VCID-jrsz-ynp7-wbb2
20
vulnerability VCID-jvrr-2gej-bfby
21
vulnerability VCID-k2s2-zkua-8ydy
22
vulnerability VCID-k4a4-f1as-x3bj
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-mwyu-5rk2-xbbz
25
vulnerability VCID-mx8t-s47w-wud5
26
vulnerability VCID-paez-g9wh-mfeq
27
vulnerability VCID-pc13-zwmr-p7hz
28
vulnerability VCID-qup9-qy11-fqhe
29
vulnerability VCID-rk7t-zjzg-eqar
30
vulnerability VCID-rzqy-gheq-cqgg
31
vulnerability VCID-szzk-wxm2-cfgj
32
vulnerability VCID-t89f-eksr-juen
33
vulnerability VCID-ukuz-m6d3-5kab
34
vulnerability VCID-vjas-pry4-93cz
35
vulnerability VCID-vszp-vyxy-f7g7
36
vulnerability VCID-vzb9-aeqz-hybr
37
vulnerability VCID-w794-gqex-83du
38
vulnerability VCID-wavp-f4kn-j3cm
39
vulnerability VCID-wut5-sqr6-mubd
40
vulnerability VCID-x1ty-wqph-gkak
41
vulnerability VCID-y43f-tmvr-hqas
42
vulnerability VCID-ykkw-a6a1-43fe
43
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1
aliases CVE-2014-1568
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdev-8m9n-8bbr
7
url VCID-qdqz-admy-e7cg
vulnerability_id VCID-qdqz-admy-e7cg
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1491.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1491
reference_id
reference_type
scores
0
value 0.00528
scoring_system epss
scoring_elements 0.67166
published_at 2026-04-13T12:55:00Z
1
value 0.00528
scoring_system epss
scoring_elements 0.67093
published_at 2026-04-01T12:55:00Z
2
value 0.00528
scoring_system epss
scoring_elements 0.6713
published_at 2026-04-02T12:55:00Z
3
value 0.00528
scoring_system epss
scoring_elements 0.67153
published_at 2026-04-04T12:55:00Z
4
value 0.00528
scoring_system epss
scoring_elements 0.67128
published_at 2026-04-07T12:55:00Z
5
value 0.00528
scoring_system epss
scoring_elements 0.67178
published_at 2026-04-08T12:55:00Z
6
value 0.00528
scoring_system epss
scoring_elements 0.67191
published_at 2026-04-09T12:55:00Z
7
value 0.00528
scoring_system epss
scoring_elements 0.6721
published_at 2026-04-11T12:55:00Z
8
value 0.00528
scoring_system epss
scoring_elements 0.67196
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1491
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1060955
reference_id 1060955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1060955
14
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
reference_id mfsa2014-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-12
16
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
17
reference_url https://access.redhat.com/errata/RHSA-2014:0979
reference_id RHSA-2014:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0979
18
reference_url https://access.redhat.com/errata/RHSA-2014:1246
reference_id RHSA-2014:1246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1246
19
reference_url https://usn.ubuntu.com/2102-1/
reference_id USN-2102-1
reference_type
scores
url https://usn.ubuntu.com/2102-1/
20
reference_url https://usn.ubuntu.com/2119-1/
reference_id USN-2119-1
reference_type
scores
url https://usn.ubuntu.com/2119-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
purl pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ert-2qyc-cfc1
1
vulnerability VCID-2w58-mdmk-guh8
2
vulnerability VCID-2w9f-avet-g7c5
3
vulnerability VCID-2zrv-q4tb-wqeg
4
vulnerability VCID-46cy-x3cp-tke5
5
vulnerability VCID-5wqt-2dtu-8qa4
6
vulnerability VCID-6fvj-phnx-kfgs
7
vulnerability VCID-7msj-wyd6-zkbe
8
vulnerability VCID-8j3v-g9xv-gud5
9
vulnerability VCID-8qtg-h4km-bfg2
10
vulnerability VCID-9mux-fuyc-a7dx
11
vulnerability VCID-b3mt-3nfn-suc1
12
vulnerability VCID-cgvg-aj53-kkbp
13
vulnerability VCID-dh3c-g3k3-zkb7
14
vulnerability VCID-dk4z-1j37-aucx
15
vulnerability VCID-dtrc-mwu9-2bdf
16
vulnerability VCID-ekxy-vaed-u7cg
17
vulnerability VCID-ewe9-39b1-kba2
18
vulnerability VCID-fgv4-bz59-h7g7
19
vulnerability VCID-gfj6-dsud-g3fh
20
vulnerability VCID-hs5f-21nx-gfeb
21
vulnerability VCID-hs79-pemh-vfd6
22
vulnerability VCID-jm5w-6pdb-bbes
23
vulnerability VCID-jmhk-12t1-kugh
24
vulnerability VCID-jrsz-ynp7-wbb2
25
vulnerability VCID-jvrr-2gej-bfby
26
vulnerability VCID-k2s2-zkua-8ydy
27
vulnerability VCID-k4a4-f1as-x3bj
28
vulnerability VCID-kxvg-qw8v-vydv
29
vulnerability VCID-mwjm-p7pr-kfhj
30
vulnerability VCID-mwyu-5rk2-xbbz
31
vulnerability VCID-mx8t-s47w-wud5
32
vulnerability VCID-paez-g9wh-mfeq
33
vulnerability VCID-pc13-zwmr-p7hz
34
vulnerability VCID-qdev-8m9n-8bbr
35
vulnerability VCID-qdqz-admy-e7cg
36
vulnerability VCID-qup9-qy11-fqhe
37
vulnerability VCID-rk7t-zjzg-eqar
38
vulnerability VCID-rzqy-gheq-cqgg
39
vulnerability VCID-sucm-cq7u-r3en
40
vulnerability VCID-szzk-wxm2-cfgj
41
vulnerability VCID-t89f-eksr-juen
42
vulnerability VCID-ukuz-m6d3-5kab
43
vulnerability VCID-uqv9-vr1q-6ya1
44
vulnerability VCID-uzt2-tufb-rua5
45
vulnerability VCID-vjas-pry4-93cz
46
vulnerability VCID-vszp-vyxy-f7g7
47
vulnerability VCID-vzb9-aeqz-hybr
48
vulnerability VCID-w5wp-ujx1-vkhp
49
vulnerability VCID-w794-gqex-83du
50
vulnerability VCID-wavp-f4kn-j3cm
51
vulnerability VCID-wut5-sqr6-mubd
52
vulnerability VCID-x1ty-wqph-gkak
53
vulnerability VCID-xap5-djda-2uem
54
vulnerability VCID-y43f-tmvr-hqas
55
vulnerability VCID-ykkw-a6a1-43fe
56
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.5-1%252Bdeb7u5
1
url pkg:deb/debian/nss@2:3.17.2-1.1
purl pkg:deb/debian/nss@2:3.17.2-1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w58-mdmk-guh8
1
vulnerability VCID-2w9f-avet-g7c5
2
vulnerability VCID-2zrv-q4tb-wqeg
3
vulnerability VCID-46cy-x3cp-tke5
4
vulnerability VCID-5wqt-2dtu-8qa4
5
vulnerability VCID-6fvj-phnx-kfgs
6
vulnerability VCID-7msj-wyd6-zkbe
7
vulnerability VCID-8qtg-h4km-bfg2
8
vulnerability VCID-9mux-fuyc-a7dx
9
vulnerability VCID-cgvg-aj53-kkbp
10
vulnerability VCID-dh3c-g3k3-zkb7
11
vulnerability VCID-dk4z-1j37-aucx
12
vulnerability VCID-ekxy-vaed-u7cg
13
vulnerability VCID-ewe9-39b1-kba2
14
vulnerability VCID-fgv4-bz59-h7g7
15
vulnerability VCID-gfj6-dsud-g3fh
16
vulnerability VCID-hs5f-21nx-gfeb
17
vulnerability VCID-hs79-pemh-vfd6
18
vulnerability VCID-jmhk-12t1-kugh
19
vulnerability VCID-jrsz-ynp7-wbb2
20
vulnerability VCID-jvrr-2gej-bfby
21
vulnerability VCID-k2s2-zkua-8ydy
22
vulnerability VCID-k4a4-f1as-x3bj
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-mwyu-5rk2-xbbz
25
vulnerability VCID-mx8t-s47w-wud5
26
vulnerability VCID-paez-g9wh-mfeq
27
vulnerability VCID-pc13-zwmr-p7hz
28
vulnerability VCID-qup9-qy11-fqhe
29
vulnerability VCID-rk7t-zjzg-eqar
30
vulnerability VCID-rzqy-gheq-cqgg
31
vulnerability VCID-szzk-wxm2-cfgj
32
vulnerability VCID-t89f-eksr-juen
33
vulnerability VCID-ukuz-m6d3-5kab
34
vulnerability VCID-vjas-pry4-93cz
35
vulnerability VCID-vszp-vyxy-f7g7
36
vulnerability VCID-vzb9-aeqz-hybr
37
vulnerability VCID-w794-gqex-83du
38
vulnerability VCID-wavp-f4kn-j3cm
39
vulnerability VCID-wut5-sqr6-mubd
40
vulnerability VCID-x1ty-wqph-gkak
41
vulnerability VCID-y43f-tmvr-hqas
42
vulnerability VCID-ykkw-a6a1-43fe
43
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1
aliases CVE-2014-1491
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqz-admy-e7cg
8
url VCID-sucm-cq7u-r3en
vulnerability_id VCID-sucm-cq7u-r3en
summary nss: Information exposure when DH secret are reused across multiple TLS connections
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12413.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12413.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12413
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50356
published_at 2026-04-01T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50411
published_at 2026-04-02T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50443
published_at 2026-04-13T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50393
published_at 2026-04-07T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50447
published_at 2026-04-08T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.5044
published_at 2026-04-09T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50481
published_at 2026-04-11T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50458
published_at 2026-04-12T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.50441
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12413
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12413
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1877557
reference_id 1877557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1877557
5
reference_url https://raccoon-attack.com/
reference_id raccoon-attack.com
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-19T15:23:13Z/
url https://raccoon-attack.com/
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2020-12413
reference_id show_bug.cgi?id=CVE-2020-12413
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-19T15:23:13Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2020-12413
fixed_packages
0
url pkg:deb/debian/nss@2:3.17.2-1.1
purl pkg:deb/debian/nss@2:3.17.2-1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w58-mdmk-guh8
1
vulnerability VCID-2w9f-avet-g7c5
2
vulnerability VCID-2zrv-q4tb-wqeg
3
vulnerability VCID-46cy-x3cp-tke5
4
vulnerability VCID-5wqt-2dtu-8qa4
5
vulnerability VCID-6fvj-phnx-kfgs
6
vulnerability VCID-7msj-wyd6-zkbe
7
vulnerability VCID-8qtg-h4km-bfg2
8
vulnerability VCID-9mux-fuyc-a7dx
9
vulnerability VCID-cgvg-aj53-kkbp
10
vulnerability VCID-dh3c-g3k3-zkb7
11
vulnerability VCID-dk4z-1j37-aucx
12
vulnerability VCID-ekxy-vaed-u7cg
13
vulnerability VCID-ewe9-39b1-kba2
14
vulnerability VCID-fgv4-bz59-h7g7
15
vulnerability VCID-gfj6-dsud-g3fh
16
vulnerability VCID-hs5f-21nx-gfeb
17
vulnerability VCID-hs79-pemh-vfd6
18
vulnerability VCID-jmhk-12t1-kugh
19
vulnerability VCID-jrsz-ynp7-wbb2
20
vulnerability VCID-jvrr-2gej-bfby
21
vulnerability VCID-k2s2-zkua-8ydy
22
vulnerability VCID-k4a4-f1as-x3bj
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-mwyu-5rk2-xbbz
25
vulnerability VCID-mx8t-s47w-wud5
26
vulnerability VCID-paez-g9wh-mfeq
27
vulnerability VCID-pc13-zwmr-p7hz
28
vulnerability VCID-qup9-qy11-fqhe
29
vulnerability VCID-rk7t-zjzg-eqar
30
vulnerability VCID-rzqy-gheq-cqgg
31
vulnerability VCID-szzk-wxm2-cfgj
32
vulnerability VCID-t89f-eksr-juen
33
vulnerability VCID-ukuz-m6d3-5kab
34
vulnerability VCID-vjas-pry4-93cz
35
vulnerability VCID-vszp-vyxy-f7g7
36
vulnerability VCID-vzb9-aeqz-hybr
37
vulnerability VCID-w794-gqex-83du
38
vulnerability VCID-wavp-f4kn-j3cm
39
vulnerability VCID-wut5-sqr6-mubd
40
vulnerability VCID-x1ty-wqph-gkak
41
vulnerability VCID-y43f-tmvr-hqas
42
vulnerability VCID-ykkw-a6a1-43fe
43
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1
aliases CVE-2020-12413
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sucm-cq7u-r3en
9
url VCID-uqv9-vr1q-6ya1
vulnerability_id VCID-uqv9-vr1q-6ya1
summary
Multiple vulnerabilities have been discovered in Mozilla Network
    Security Service, the worst of which could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1739.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1739.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1739
reference_id
reference_type
scores
0
value 0.0287
scoring_system epss
scoring_elements 0.8627
published_at 2026-04-13T12:55:00Z
1
value 0.0287
scoring_system epss
scoring_elements 0.86205
published_at 2026-04-01T12:55:00Z
2
value 0.0287
scoring_system epss
scoring_elements 0.86215
published_at 2026-04-02T12:55:00Z
3
value 0.0287
scoring_system epss
scoring_elements 0.86232
published_at 2026-04-07T12:55:00Z
4
value 0.0287
scoring_system epss
scoring_elements 0.86251
published_at 2026-04-08T12:55:00Z
5
value 0.0287
scoring_system epss
scoring_elements 0.86262
published_at 2026-04-09T12:55:00Z
6
value 0.0287
scoring_system epss
scoring_elements 0.86276
published_at 2026-04-11T12:55:00Z
7
value 0.0287
scoring_system epss
scoring_elements 0.86274
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1739
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1012740
reference_id 1012740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1012740
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726473
reference_id 726473
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726473
5
reference_url https://security.gentoo.org/glsa/201406-19
reference_id GLSA-201406-19
reference_type
scores
url https://security.gentoo.org/glsa/201406-19
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2013-93
reference_id mfsa2013-93
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2013-93
7
reference_url https://access.redhat.com/errata/RHSA-2013:1791
reference_id RHSA-2013:1791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1791
8
reference_url https://access.redhat.com/errata/RHSA-2013:1829
reference_id RHSA-2013:1829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1829
9
reference_url https://usn.ubuntu.com/2009-1/
reference_id USN-2009-1
reference_type
scores
url https://usn.ubuntu.com/2009-1/
10
reference_url https://usn.ubuntu.com/2010-1/
reference_id USN-2010-1
reference_type
scores
url https://usn.ubuntu.com/2010-1/
11
reference_url https://usn.ubuntu.com/2030-1/
reference_id USN-2030-1
reference_type
scores
url https://usn.ubuntu.com/2030-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
purl pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ert-2qyc-cfc1
1
vulnerability VCID-2w58-mdmk-guh8
2
vulnerability VCID-2w9f-avet-g7c5
3
vulnerability VCID-2zrv-q4tb-wqeg
4
vulnerability VCID-46cy-x3cp-tke5
5
vulnerability VCID-5wqt-2dtu-8qa4
6
vulnerability VCID-6fvj-phnx-kfgs
7
vulnerability VCID-7msj-wyd6-zkbe
8
vulnerability VCID-8j3v-g9xv-gud5
9
vulnerability VCID-8qtg-h4km-bfg2
10
vulnerability VCID-9mux-fuyc-a7dx
11
vulnerability VCID-b3mt-3nfn-suc1
12
vulnerability VCID-cgvg-aj53-kkbp
13
vulnerability VCID-dh3c-g3k3-zkb7
14
vulnerability VCID-dk4z-1j37-aucx
15
vulnerability VCID-dtrc-mwu9-2bdf
16
vulnerability VCID-ekxy-vaed-u7cg
17
vulnerability VCID-ewe9-39b1-kba2
18
vulnerability VCID-fgv4-bz59-h7g7
19
vulnerability VCID-gfj6-dsud-g3fh
20
vulnerability VCID-hs5f-21nx-gfeb
21
vulnerability VCID-hs79-pemh-vfd6
22
vulnerability VCID-jm5w-6pdb-bbes
23
vulnerability VCID-jmhk-12t1-kugh
24
vulnerability VCID-jrsz-ynp7-wbb2
25
vulnerability VCID-jvrr-2gej-bfby
26
vulnerability VCID-k2s2-zkua-8ydy
27
vulnerability VCID-k4a4-f1as-x3bj
28
vulnerability VCID-kxvg-qw8v-vydv
29
vulnerability VCID-mwjm-p7pr-kfhj
30
vulnerability VCID-mwyu-5rk2-xbbz
31
vulnerability VCID-mx8t-s47w-wud5
32
vulnerability VCID-paez-g9wh-mfeq
33
vulnerability VCID-pc13-zwmr-p7hz
34
vulnerability VCID-qdev-8m9n-8bbr
35
vulnerability VCID-qdqz-admy-e7cg
36
vulnerability VCID-qup9-qy11-fqhe
37
vulnerability VCID-rk7t-zjzg-eqar
38
vulnerability VCID-rzqy-gheq-cqgg
39
vulnerability VCID-sucm-cq7u-r3en
40
vulnerability VCID-szzk-wxm2-cfgj
41
vulnerability VCID-t89f-eksr-juen
42
vulnerability VCID-ukuz-m6d3-5kab
43
vulnerability VCID-uqv9-vr1q-6ya1
44
vulnerability VCID-uzt2-tufb-rua5
45
vulnerability VCID-vjas-pry4-93cz
46
vulnerability VCID-vszp-vyxy-f7g7
47
vulnerability VCID-vzb9-aeqz-hybr
48
vulnerability VCID-w5wp-ujx1-vkhp
49
vulnerability VCID-w794-gqex-83du
50
vulnerability VCID-wavp-f4kn-j3cm
51
vulnerability VCID-wut5-sqr6-mubd
52
vulnerability VCID-x1ty-wqph-gkak
53
vulnerability VCID-xap5-djda-2uem
54
vulnerability VCID-y43f-tmvr-hqas
55
vulnerability VCID-ykkw-a6a1-43fe
56
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.5-1%252Bdeb7u5
1
url pkg:deb/debian/nss@2:3.17.2-1.1
purl pkg:deb/debian/nss@2:3.17.2-1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w58-mdmk-guh8
1
vulnerability VCID-2w9f-avet-g7c5
2
vulnerability VCID-2zrv-q4tb-wqeg
3
vulnerability VCID-46cy-x3cp-tke5
4
vulnerability VCID-5wqt-2dtu-8qa4
5
vulnerability VCID-6fvj-phnx-kfgs
6
vulnerability VCID-7msj-wyd6-zkbe
7
vulnerability VCID-8qtg-h4km-bfg2
8
vulnerability VCID-9mux-fuyc-a7dx
9
vulnerability VCID-cgvg-aj53-kkbp
10
vulnerability VCID-dh3c-g3k3-zkb7
11
vulnerability VCID-dk4z-1j37-aucx
12
vulnerability VCID-ekxy-vaed-u7cg
13
vulnerability VCID-ewe9-39b1-kba2
14
vulnerability VCID-fgv4-bz59-h7g7
15
vulnerability VCID-gfj6-dsud-g3fh
16
vulnerability VCID-hs5f-21nx-gfeb
17
vulnerability VCID-hs79-pemh-vfd6
18
vulnerability VCID-jmhk-12t1-kugh
19
vulnerability VCID-jrsz-ynp7-wbb2
20
vulnerability VCID-jvrr-2gej-bfby
21
vulnerability VCID-k2s2-zkua-8ydy
22
vulnerability VCID-k4a4-f1as-x3bj
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-mwyu-5rk2-xbbz
25
vulnerability VCID-mx8t-s47w-wud5
26
vulnerability VCID-paez-g9wh-mfeq
27
vulnerability VCID-pc13-zwmr-p7hz
28
vulnerability VCID-qup9-qy11-fqhe
29
vulnerability VCID-rk7t-zjzg-eqar
30
vulnerability VCID-rzqy-gheq-cqgg
31
vulnerability VCID-szzk-wxm2-cfgj
32
vulnerability VCID-t89f-eksr-juen
33
vulnerability VCID-ukuz-m6d3-5kab
34
vulnerability VCID-vjas-pry4-93cz
35
vulnerability VCID-vszp-vyxy-f7g7
36
vulnerability VCID-vzb9-aeqz-hybr
37
vulnerability VCID-w794-gqex-83du
38
vulnerability VCID-wavp-f4kn-j3cm
39
vulnerability VCID-wut5-sqr6-mubd
40
vulnerability VCID-x1ty-wqph-gkak
41
vulnerability VCID-y43f-tmvr-hqas
42
vulnerability VCID-ykkw-a6a1-43fe
43
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1
aliases CVE-2013-1739
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uqv9-vr1q-6ya1
10
url VCID-uzt2-tufb-rua5
vulnerability_id VCID-uzt2-tufb-rua5
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1569.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1569.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1569
reference_id
reference_type
scores
0
value 0.03635
scoring_system epss
scoring_elements 0.8784
published_at 2026-04-13T12:55:00Z
1
value 0.03635
scoring_system epss
scoring_elements 0.87783
published_at 2026-04-01T12:55:00Z
2
value 0.03635
scoring_system epss
scoring_elements 0.87793
published_at 2026-04-02T12:55:00Z
3
value 0.03635
scoring_system epss
scoring_elements 0.87804
published_at 2026-04-04T12:55:00Z
4
value 0.03635
scoring_system epss
scoring_elements 0.87808
published_at 2026-04-07T12:55:00Z
5
value 0.03635
scoring_system epss
scoring_elements 0.87829
published_at 2026-04-08T12:55:00Z
6
value 0.03635
scoring_system epss
scoring_elements 0.87836
published_at 2026-04-09T12:55:00Z
7
value 0.03635
scoring_system epss
scoring_elements 0.87848
published_at 2026-04-11T12:55:00Z
8
value 0.03635
scoring_system epss
scoring_elements 0.87842
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1569
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1064670
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1064670
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569
9
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes
10
reference_url https://www.imperialviolet.org/2014/09/26/pkcs1.html
reference_id
reference_type
scores
url https://www.imperialviolet.org/2014/09/26/pkcs1.html
11
reference_url https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02
reference_id
reference_type
scores
url https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02
12
reference_url http://www.debian.org/security/2015/dsa-3186
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3186
13
reference_url http://www.intelsecurity.com/resources/wp-berserk-analysis-part-1.pdf
reference_id
reference_type
scores
url http://www.intelsecurity.com/resources/wp-berserk-analysis-part-1.pdf
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
15
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
16
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
17
reference_url http://www.securitytracker.com/id/1032909
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1032909
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1174492
reference_id 1174492
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1174492
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773625
reference_id 773625
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773625
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.2.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.2.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.2.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.17.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.17.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.17.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.17.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.17.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1569
reference_id CVE-2014-1569
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-1569
28
reference_url https://usn.ubuntu.com/2452-1/
reference_id USN-2452-1
reference_type
scores
url https://usn.ubuntu.com/2452-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
purl pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ert-2qyc-cfc1
1
vulnerability VCID-2w58-mdmk-guh8
2
vulnerability VCID-2w9f-avet-g7c5
3
vulnerability VCID-2zrv-q4tb-wqeg
4
vulnerability VCID-46cy-x3cp-tke5
5
vulnerability VCID-5wqt-2dtu-8qa4
6
vulnerability VCID-6fvj-phnx-kfgs
7
vulnerability VCID-7msj-wyd6-zkbe
8
vulnerability VCID-8j3v-g9xv-gud5
9
vulnerability VCID-8qtg-h4km-bfg2
10
vulnerability VCID-9mux-fuyc-a7dx
11
vulnerability VCID-b3mt-3nfn-suc1
12
vulnerability VCID-cgvg-aj53-kkbp
13
vulnerability VCID-dh3c-g3k3-zkb7
14
vulnerability VCID-dk4z-1j37-aucx
15
vulnerability VCID-dtrc-mwu9-2bdf
16
vulnerability VCID-ekxy-vaed-u7cg
17
vulnerability VCID-ewe9-39b1-kba2
18
vulnerability VCID-fgv4-bz59-h7g7
19
vulnerability VCID-gfj6-dsud-g3fh
20
vulnerability VCID-hs5f-21nx-gfeb
21
vulnerability VCID-hs79-pemh-vfd6
22
vulnerability VCID-jm5w-6pdb-bbes
23
vulnerability VCID-jmhk-12t1-kugh
24
vulnerability VCID-jrsz-ynp7-wbb2
25
vulnerability VCID-jvrr-2gej-bfby
26
vulnerability VCID-k2s2-zkua-8ydy
27
vulnerability VCID-k4a4-f1as-x3bj
28
vulnerability VCID-kxvg-qw8v-vydv
29
vulnerability VCID-mwjm-p7pr-kfhj
30
vulnerability VCID-mwyu-5rk2-xbbz
31
vulnerability VCID-mx8t-s47w-wud5
32
vulnerability VCID-paez-g9wh-mfeq
33
vulnerability VCID-pc13-zwmr-p7hz
34
vulnerability VCID-qdev-8m9n-8bbr
35
vulnerability VCID-qdqz-admy-e7cg
36
vulnerability VCID-qup9-qy11-fqhe
37
vulnerability VCID-rk7t-zjzg-eqar
38
vulnerability VCID-rzqy-gheq-cqgg
39
vulnerability VCID-sucm-cq7u-r3en
40
vulnerability VCID-szzk-wxm2-cfgj
41
vulnerability VCID-t89f-eksr-juen
42
vulnerability VCID-ukuz-m6d3-5kab
43
vulnerability VCID-uqv9-vr1q-6ya1
44
vulnerability VCID-uzt2-tufb-rua5
45
vulnerability VCID-vjas-pry4-93cz
46
vulnerability VCID-vszp-vyxy-f7g7
47
vulnerability VCID-vzb9-aeqz-hybr
48
vulnerability VCID-w5wp-ujx1-vkhp
49
vulnerability VCID-w794-gqex-83du
50
vulnerability VCID-wavp-f4kn-j3cm
51
vulnerability VCID-wut5-sqr6-mubd
52
vulnerability VCID-x1ty-wqph-gkak
53
vulnerability VCID-xap5-djda-2uem
54
vulnerability VCID-y43f-tmvr-hqas
55
vulnerability VCID-ykkw-a6a1-43fe
56
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.5-1%252Bdeb7u5
1
url pkg:deb/debian/nss@2:3.17.2-1.1
purl pkg:deb/debian/nss@2:3.17.2-1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w58-mdmk-guh8
1
vulnerability VCID-2w9f-avet-g7c5
2
vulnerability VCID-2zrv-q4tb-wqeg
3
vulnerability VCID-46cy-x3cp-tke5
4
vulnerability VCID-5wqt-2dtu-8qa4
5
vulnerability VCID-6fvj-phnx-kfgs
6
vulnerability VCID-7msj-wyd6-zkbe
7
vulnerability VCID-8qtg-h4km-bfg2
8
vulnerability VCID-9mux-fuyc-a7dx
9
vulnerability VCID-cgvg-aj53-kkbp
10
vulnerability VCID-dh3c-g3k3-zkb7
11
vulnerability VCID-dk4z-1j37-aucx
12
vulnerability VCID-ekxy-vaed-u7cg
13
vulnerability VCID-ewe9-39b1-kba2
14
vulnerability VCID-fgv4-bz59-h7g7
15
vulnerability VCID-gfj6-dsud-g3fh
16
vulnerability VCID-hs5f-21nx-gfeb
17
vulnerability VCID-hs79-pemh-vfd6
18
vulnerability VCID-jmhk-12t1-kugh
19
vulnerability VCID-jrsz-ynp7-wbb2
20
vulnerability VCID-jvrr-2gej-bfby
21
vulnerability VCID-k2s2-zkua-8ydy
22
vulnerability VCID-k4a4-f1as-x3bj
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-mwyu-5rk2-xbbz
25
vulnerability VCID-mx8t-s47w-wud5
26
vulnerability VCID-paez-g9wh-mfeq
27
vulnerability VCID-pc13-zwmr-p7hz
28
vulnerability VCID-qup9-qy11-fqhe
29
vulnerability VCID-rk7t-zjzg-eqar
30
vulnerability VCID-rzqy-gheq-cqgg
31
vulnerability VCID-szzk-wxm2-cfgj
32
vulnerability VCID-t89f-eksr-juen
33
vulnerability VCID-ukuz-m6d3-5kab
34
vulnerability VCID-vjas-pry4-93cz
35
vulnerability VCID-vszp-vyxy-f7g7
36
vulnerability VCID-vzb9-aeqz-hybr
37
vulnerability VCID-w794-gqex-83du
38
vulnerability VCID-wavp-f4kn-j3cm
39
vulnerability VCID-wut5-sqr6-mubd
40
vulnerability VCID-x1ty-wqph-gkak
41
vulnerability VCID-y43f-tmvr-hqas
42
vulnerability VCID-ykkw-a6a1-43fe
43
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1
aliases CVE-2014-1569
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uzt2-tufb-rua5
11
url VCID-w5wp-ujx1-vkhp
vulnerability_id VCID-w5wp-ujx1-vkhp
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1544.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1544.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1544
reference_id
reference_type
scores
0
value 0.01956
scoring_system epss
scoring_elements 0.8348
published_at 2026-04-13T12:55:00Z
1
value 0.01956
scoring_system epss
scoring_elements 0.83416
published_at 2026-04-01T12:55:00Z
2
value 0.01956
scoring_system epss
scoring_elements 0.83491
published_at 2026-04-11T12:55:00Z
3
value 0.01956
scoring_system epss
scoring_elements 0.83485
published_at 2026-04-12T12:55:00Z
4
value 0.01956
scoring_system epss
scoring_elements 0.83429
published_at 2026-04-02T12:55:00Z
5
value 0.01956
scoring_system epss
scoring_elements 0.83443
published_at 2026-04-04T12:55:00Z
6
value 0.01956
scoring_system epss
scoring_elements 0.83442
published_at 2026-04-07T12:55:00Z
7
value 0.01956
scoring_system epss
scoring_elements 0.83467
published_at 2026-04-08T12:55:00Z
8
value 0.01956
scoring_system epss
scoring_elements 0.83476
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1544
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=963150
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=963150
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557
8
reference_url http://secunia.com/advisories/59591
reference_id
reference_type
scores
url http://secunia.com/advisories/59591
9
reference_url http://secunia.com/advisories/59719
reference_id
reference_type
scores
url http://secunia.com/advisories/59719
10
reference_url http://secunia.com/advisories/59760
reference_id
reference_type
scores
url http://secunia.com/advisories/59760
11
reference_url http://secunia.com/advisories/60083
reference_id
reference_type
scores
url http://secunia.com/advisories/60083
12
reference_url http://secunia.com/advisories/60486
reference_id
reference_type
scores
url http://secunia.com/advisories/60486
13
reference_url http://secunia.com/advisories/60621
reference_id
reference_type
scores
url http://secunia.com/advisories/60621
14
reference_url http://secunia.com/advisories/60628
reference_id
reference_type
scores
url http://secunia.com/advisories/60628
15
reference_url http://www.debian.org/security/2014/dsa-2986
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2986
16
reference_url http://www.debian.org/security/2014/dsa-2996
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2996
17
reference_url http://www.mozilla.org/security/announce/2014/mfsa2014-63.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2014/mfsa2014-63.html
18
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
19
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
20
reference_url http://www.securityfocus.com/bid/68816
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68816
21
reference_url http://www.securitytracker.com/id/1030617
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030617
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1116198
reference_id 1116198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1116198
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1544
reference_id CVE-2014-1544
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-1544
95
reference_url https://security.gentoo.org/glsa/201504-01
reference_id GLSA-201504-01
reference_type
scores
url https://security.gentoo.org/glsa/201504-01
96
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2014-63
reference_id mfsa2014-63
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2014-63
97
reference_url https://access.redhat.com/errata/RHSA-2014:0915
reference_id RHSA-2014:0915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0915
98
reference_url https://access.redhat.com/errata/RHSA-2014:0916
reference_id RHSA-2014:0916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0916
99
reference_url https://access.redhat.com/errata/RHSA-2014:0917
reference_id RHSA-2014:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0917
100
reference_url https://access.redhat.com/errata/RHSA-2014:1165
reference_id RHSA-2014:1165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1165
101
reference_url https://usn.ubuntu.com/2295-1/
reference_id USN-2295-1
reference_type
scores
url https://usn.ubuntu.com/2295-1/
102
reference_url https://usn.ubuntu.com/2296-1/
reference_id USN-2296-1
reference_type
scores
url https://usn.ubuntu.com/2296-1/
103
reference_url https://usn.ubuntu.com/2343-1/
reference_id USN-2343-1
reference_type
scores
url https://usn.ubuntu.com/2343-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
purl pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ert-2qyc-cfc1
1
vulnerability VCID-2w58-mdmk-guh8
2
vulnerability VCID-2w9f-avet-g7c5
3
vulnerability VCID-2zrv-q4tb-wqeg
4
vulnerability VCID-46cy-x3cp-tke5
5
vulnerability VCID-5wqt-2dtu-8qa4
6
vulnerability VCID-6fvj-phnx-kfgs
7
vulnerability VCID-7msj-wyd6-zkbe
8
vulnerability VCID-8j3v-g9xv-gud5
9
vulnerability VCID-8qtg-h4km-bfg2
10
vulnerability VCID-9mux-fuyc-a7dx
11
vulnerability VCID-b3mt-3nfn-suc1
12
vulnerability VCID-cgvg-aj53-kkbp
13
vulnerability VCID-dh3c-g3k3-zkb7
14
vulnerability VCID-dk4z-1j37-aucx
15
vulnerability VCID-dtrc-mwu9-2bdf
16
vulnerability VCID-ekxy-vaed-u7cg
17
vulnerability VCID-ewe9-39b1-kba2
18
vulnerability VCID-fgv4-bz59-h7g7
19
vulnerability VCID-gfj6-dsud-g3fh
20
vulnerability VCID-hs5f-21nx-gfeb
21
vulnerability VCID-hs79-pemh-vfd6
22
vulnerability VCID-jm5w-6pdb-bbes
23
vulnerability VCID-jmhk-12t1-kugh
24
vulnerability VCID-jrsz-ynp7-wbb2
25
vulnerability VCID-jvrr-2gej-bfby
26
vulnerability VCID-k2s2-zkua-8ydy
27
vulnerability VCID-k4a4-f1as-x3bj
28
vulnerability VCID-kxvg-qw8v-vydv
29
vulnerability VCID-mwjm-p7pr-kfhj
30
vulnerability VCID-mwyu-5rk2-xbbz
31
vulnerability VCID-mx8t-s47w-wud5
32
vulnerability VCID-paez-g9wh-mfeq
33
vulnerability VCID-pc13-zwmr-p7hz
34
vulnerability VCID-qdev-8m9n-8bbr
35
vulnerability VCID-qdqz-admy-e7cg
36
vulnerability VCID-qup9-qy11-fqhe
37
vulnerability VCID-rk7t-zjzg-eqar
38
vulnerability VCID-rzqy-gheq-cqgg
39
vulnerability VCID-sucm-cq7u-r3en
40
vulnerability VCID-szzk-wxm2-cfgj
41
vulnerability VCID-t89f-eksr-juen
42
vulnerability VCID-ukuz-m6d3-5kab
43
vulnerability VCID-uqv9-vr1q-6ya1
44
vulnerability VCID-uzt2-tufb-rua5
45
vulnerability VCID-vjas-pry4-93cz
46
vulnerability VCID-vszp-vyxy-f7g7
47
vulnerability VCID-vzb9-aeqz-hybr
48
vulnerability VCID-w5wp-ujx1-vkhp
49
vulnerability VCID-w794-gqex-83du
50
vulnerability VCID-wavp-f4kn-j3cm
51
vulnerability VCID-wut5-sqr6-mubd
52
vulnerability VCID-x1ty-wqph-gkak
53
vulnerability VCID-xap5-djda-2uem
54
vulnerability VCID-y43f-tmvr-hqas
55
vulnerability VCID-ykkw-a6a1-43fe
56
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.14.5-1%252Bdeb7u5
1
url pkg:deb/debian/nss@2:3.17.2-1.1
purl pkg:deb/debian/nss@2:3.17.2-1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w58-mdmk-guh8
1
vulnerability VCID-2w9f-avet-g7c5
2
vulnerability VCID-2zrv-q4tb-wqeg
3
vulnerability VCID-46cy-x3cp-tke5
4
vulnerability VCID-5wqt-2dtu-8qa4
5
vulnerability VCID-6fvj-phnx-kfgs
6
vulnerability VCID-7msj-wyd6-zkbe
7
vulnerability VCID-8qtg-h4km-bfg2
8
vulnerability VCID-9mux-fuyc-a7dx
9
vulnerability VCID-cgvg-aj53-kkbp
10
vulnerability VCID-dh3c-g3k3-zkb7
11
vulnerability VCID-dk4z-1j37-aucx
12
vulnerability VCID-ekxy-vaed-u7cg
13
vulnerability VCID-ewe9-39b1-kba2
14
vulnerability VCID-fgv4-bz59-h7g7
15
vulnerability VCID-gfj6-dsud-g3fh
16
vulnerability VCID-hs5f-21nx-gfeb
17
vulnerability VCID-hs79-pemh-vfd6
18
vulnerability VCID-jmhk-12t1-kugh
19
vulnerability VCID-jrsz-ynp7-wbb2
20
vulnerability VCID-jvrr-2gej-bfby
21
vulnerability VCID-k2s2-zkua-8ydy
22
vulnerability VCID-k4a4-f1as-x3bj
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-mwyu-5rk2-xbbz
25
vulnerability VCID-mx8t-s47w-wud5
26
vulnerability VCID-paez-g9wh-mfeq
27
vulnerability VCID-pc13-zwmr-p7hz
28
vulnerability VCID-qup9-qy11-fqhe
29
vulnerability VCID-rk7t-zjzg-eqar
30
vulnerability VCID-rzqy-gheq-cqgg
31
vulnerability VCID-szzk-wxm2-cfgj
32
vulnerability VCID-t89f-eksr-juen
33
vulnerability VCID-ukuz-m6d3-5kab
34
vulnerability VCID-vjas-pry4-93cz
35
vulnerability VCID-vszp-vyxy-f7g7
36
vulnerability VCID-vzb9-aeqz-hybr
37
vulnerability VCID-w794-gqex-83du
38
vulnerability VCID-wavp-f4kn-j3cm
39
vulnerability VCID-wut5-sqr6-mubd
40
vulnerability VCID-x1ty-wqph-gkak
41
vulnerability VCID-y43f-tmvr-hqas
42
vulnerability VCID-ykkw-a6a1-43fe
43
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1
aliases CVE-2014-1544
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w5wp-ujx1-vkhp
12
url VCID-xap5-djda-2uem
vulnerability_id VCID-xap5-djda-2uem
summary
Multiple vulnerabilities have been found in Oracle JRE/JDK,
    allowing both local and remote attackers to compromise various Java
    components.
references
0
reference_url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
reference_id
reference_type
scores
url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
1
reference_url http://advisories.mageia.org/MGASA-2014-0416.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0416.html
2
reference_url http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
reference_id
reference_type
scores
url http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
3
reference_url http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
4
reference_url http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
5
reference_url http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
reference_id
reference_type
scores
url http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
6
reference_url http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
reference_id
reference_type
scores
url http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
7
reference_url http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
reference_id
reference_type
scores
url http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
8
reference_url http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
reference_id
reference_type
scores
url http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
9
reference_url http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
reference_id
reference_type
scores
url http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
10
reference_url http://downloads.asterisk.org/pub/security/AST-2014-011.html
reference_id
reference_type
scores
url http://downloads.asterisk.org/pub/security/AST-2014-011.html
11
reference_url http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
reference_id
reference_type
scores
url http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
12
reference_url http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
reference_id
reference_type
scores
url http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
13
reference_url http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
reference_id
reference_type
scores
url http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
14
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
15
reference_url http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
16
reference_url http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
17
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
18
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
19
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
20
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
21
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
22
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
25
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
26
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
27
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
28
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
29
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
30
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
31
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
32
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
33
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
34
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
35
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
36
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
37
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
38
reference_url http://marc.info/?l=bugtraq&m=141450452204552&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141450452204552&w=2
39
reference_url http://marc.info/?l=bugtraq&m=141450973807288&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141450973807288&w=2
40
reference_url http://marc.info/?l=bugtraq&m=141477196830952&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141477196830952&w=2
41
reference_url http://marc.info/?l=bugtraq&m=141576815022399&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141576815022399&w=2
42
reference_url http://marc.info/?l=bugtraq&m=141577087123040&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141577087123040&w=2
43
reference_url http://marc.info/?l=bugtraq&m=141577350823734&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141577350823734&w=2
44
reference_url http://marc.info/?l=bugtraq&m=141620103726640&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141620103726640&w=2
45
reference_url http://marc.info/?l=bugtraq&m=141628688425177&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141628688425177&w=2
46
reference_url http://marc.info/?l=bugtraq&m=141694355519663&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141694355519663&w=2
47
reference_url http://marc.info/?l=bugtraq&m=141697638231025&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141697638231025&w=2
48
reference_url http://marc.info/?l=bugtraq&m=141697676231104&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141697676231104&w=2
49
reference_url http://marc.info/?l=bugtraq&m=141703183219781&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141703183219781&w=2
50
reference_url http://marc.info/?l=bugtraq&m=141715130023061&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141715130023061&w=2
51
reference_url http://marc.info/?l=bugtraq&m=141775427104070&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775427104070&w=2
52
reference_url http://marc.info/?l=bugtraq&m=141813976718456&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141813976718456&w=2
53
reference_url http://marc.info/?l=bugtraq&m=141814011518700&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141814011518700&w=2
54
reference_url http://marc.info/?l=bugtraq&m=141879378918327&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141879378918327&w=2
55
reference_url http://marc.info/?l=bugtraq&m=142103967620673&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142103967620673&w=2
56
reference_url http://marc.info/?l=bugtraq&m=142118135300698&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142118135300698&w=2
57
reference_url http://marc.info/?l=bugtraq&m=142296755107581&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142296755107581&w=2
58
reference_url http://marc.info/?l=bugtraq&m=142350196615714&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142350196615714&w=2
59
reference_url http://marc.info/?l=bugtraq&m=142350298616097&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142350298616097&w=2
60
reference_url http://marc.info/?l=bugtraq&m=142350743917559&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142350743917559&w=2
61
reference_url http://marc.info/?l=bugtraq&m=142354438527235&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142354438527235&w=2
62
reference_url http://marc.info/?l=bugtraq&m=142357976805598&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142357976805598&w=2
63
reference_url http://marc.info/?l=bugtraq&m=142495837901899&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142495837901899&w=2
64
reference_url http://marc.info/?l=bugtraq&m=142496355704097&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142496355704097&w=2
65
reference_url http://marc.info/?l=bugtraq&m=142546741516006&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142546741516006&w=2
66
reference_url http://marc.info/?l=bugtraq&m=142607790919348&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142607790919348&w=2
67
reference_url http://marc.info/?l=bugtraq&m=142624590206005&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624590206005&w=2
68
reference_url http://marc.info/?l=bugtraq&m=142624619906067
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624619906067
69
reference_url http://marc.info/?l=bugtraq&m=142624619906067&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624619906067&w=2
70
reference_url http://marc.info/?l=bugtraq&m=142624679706236&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624679706236&w=2
71
reference_url http://marc.info/?l=bugtraq&m=142624719706349&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624719706349&w=2
72
reference_url http://marc.info/?l=bugtraq&m=142660345230545&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142660345230545&w=2
73
reference_url http://marc.info/?l=bugtraq&m=142721830231196&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142721830231196&w=2
74
reference_url http://marc.info/?l=bugtraq&m=142721887231400&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142721887231400&w=2
75
reference_url http://marc.info/?l=bugtraq&m=142740155824959&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142740155824959&w=2
76
reference_url http://marc.info/?l=bugtraq&m=142791032306609&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142791032306609&w=2
77
reference_url http://marc.info/?l=bugtraq&m=142804214608580&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142804214608580&w=2
78
reference_url http://marc.info/?l=bugtraq&m=142805027510172&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142805027510172&w=2
79
reference_url http://marc.info/?l=bugtraq&m=142962817202793&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142962817202793&w=2
80
reference_url http://marc.info/?l=bugtraq&m=143039249603103&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143039249603103&w=2
81
reference_url http://marc.info/?l=bugtraq&m=143101048219218&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143101048219218&w=2
82
reference_url http://marc.info/?l=bugtraq&m=143290371927178&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143290371927178&w=2
83
reference_url http://marc.info/?l=bugtraq&m=143290437727362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143290437727362&w=2
84
reference_url http://marc.info/?l=bugtraq&m=143290522027658&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143290522027658&w=2
85
reference_url http://marc.info/?l=bugtraq&m=143290583027876&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143290583027876&w=2
86
reference_url http://marc.info/?l=bugtraq&m=143558137709884&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143558137709884&w=2
87
reference_url http://marc.info/?l=bugtraq&m=143558192010071&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143558192010071&w=2
88
reference_url http://marc.info/?l=bugtraq&m=143628269912142&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143628269912142&w=2
89
reference_url http://marc.info/?l=bugtraq&m=144101915224472&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144101915224472&w=2
90
reference_url http://marc.info/?l=bugtraq&m=144251162130364&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144251162130364&w=2
91
reference_url http://marc.info/?l=bugtraq&m=144294141001552&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144294141001552&w=2
92
reference_url http://marc.info/?l=bugtraq&m=145983526810210&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=145983526810210&w=2
93
reference_url http://marc.info/?l=openssl-dev&m=141333049205629&w=2
reference_id
reference_type
scores
url http://marc.info/?l=openssl-dev&m=141333049205629&w=2
94
reference_url http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
reference_id
reference_type
scores
url http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
95
reference_url http://rhn.redhat.com/errata/RHSA-2014-1652.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1652.html
96
reference_url http://rhn.redhat.com/errata/RHSA-2014-1653.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1653.html
97
reference_url http://rhn.redhat.com/errata/RHSA-2014-1692.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1692.html
98
reference_url http://rhn.redhat.com/errata/RHSA-2014-1876.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1876.html
99
reference_url http://rhn.redhat.com/errata/RHSA-2014-1877.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1877.html
100
reference_url http://rhn.redhat.com/errata/RHSA-2014-1880.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1880.html
101
reference_url http://rhn.redhat.com/errata/RHSA-2014-1881.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1881.html
102
reference_url http://rhn.redhat.com/errata/RHSA-2014-1882.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1882.html
103
reference_url http://rhn.redhat.com/errata/RHSA-2014-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1920.html
104
reference_url http://rhn.redhat.com/errata/RHSA-2014-1948.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1948.html
105
reference_url http://rhn.redhat.com/errata/RHSA-2015-0068.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0068.html
106
reference_url http://rhn.redhat.com/errata/RHSA-2015-0079.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0079.html
107
reference_url http://rhn.redhat.com/errata/RHSA-2015-0080.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0080.html
108
reference_url http://rhn.redhat.com/errata/RHSA-2015-0085.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0085.html
109
reference_url http://rhn.redhat.com/errata/RHSA-2015-0086.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0086.html
110
reference_url http://rhn.redhat.com/errata/RHSA-2015-0264.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0264.html
111
reference_url http://rhn.redhat.com/errata/RHSA-2015-0698.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0698.html
112
reference_url http://rhn.redhat.com/errata/RHSA-2015-1545.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1545.html
113
reference_url http://rhn.redhat.com/errata/RHSA-2015-1546.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1546.html
114
reference_url https://access.redhat.com/articles/1232123
reference_id
reference_type
scores
url https://access.redhat.com/articles/1232123
115
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3566.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3566.json
116
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3566
reference_id
reference_type
scores
0
value 0.94015
scoring_system epss
scoring_elements 0.99894
published_at 2026-04-02T12:55:00Z
1
value 0.94015
scoring_system epss
scoring_elements 0.99895
published_at 2026-04-11T12:55:00Z
2
value 0.94015
scoring_system epss
scoring_elements 0.99896
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3566
117
reference_url https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
reference_id
reference_type
scores
url https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
118
reference_url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
reference_id
reference_type
scores
url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
119
reference_url https://bto.bluecoat.com/security-advisory/sa83
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa83
120
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412
140
reference_url https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
reference_id
reference_type
scores
url https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
141
reference_url http://secunia.com/advisories/59627
reference_id
reference_type
scores
url http://secunia.com/advisories/59627
142
reference_url http://secunia.com/advisories/60056
reference_id
reference_type
scores
url http://secunia.com/advisories/60056
143
reference_url http://secunia.com/advisories/60206
reference_id
reference_type
scores
url http://secunia.com/advisories/60206
144
reference_url http://secunia.com/advisories/60792
reference_id
reference_type
scores
url http://secunia.com/advisories/60792
145
reference_url http://secunia.com/advisories/60859
reference_id
reference_type
scores
url http://secunia.com/advisories/60859
146
reference_url http://secunia.com/advisories/61019
reference_id
reference_type
scores
url http://secunia.com/advisories/61019
147
reference_url http://secunia.com/advisories/61130
reference_id
reference_type
scores
url http://secunia.com/advisories/61130
148
reference_url http://secunia.com/advisories/61303
reference_id
reference_type
scores
url http://secunia.com/advisories/61303
149
reference_url http://secunia.com/advisories/61316
reference_id
reference_type
scores
url http://secunia.com/advisories/61316
150
reference_url http://secunia.com/advisories/61345
reference_id
reference_type
scores
url http://secunia.com/advisories/61345
151
reference_url http://secunia.com/advisories/61359
reference_id
reference_type
scores
url http://secunia.com/advisories/61359
152
reference_url http://secunia.com/advisories/61782
reference_id
reference_type
scores
url http://secunia.com/advisories/61782
153
reference_url http://secunia.com/advisories/61810
reference_id
reference_type
scores
url http://secunia.com/advisories/61810
154
reference_url http://secunia.com/advisories/61819
reference_id
reference_type
scores
url http://secunia.com/advisories/61819
155
reference_url http://secunia.com/advisories/61825
reference_id
reference_type
scores
url http://secunia.com/advisories/61825
156
reference_url http://secunia.com/advisories/61827
reference_id
reference_type
scores
url http://secunia.com/advisories/61827
157
reference_url http://secunia.com/advisories/61926
reference_id
reference_type
scores
url http://secunia.com/advisories/61926
158
reference_url http://secunia.com/advisories/61995
reference_id
reference_type
scores
url http://secunia.com/advisories/61995
159
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
160
reference_url https://github.com/mpgn/poodle-PoC
reference_id
reference_type
scores
url https://github.com/mpgn/poodle-PoC
161
reference_url https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
reference_id
reference_type
scores
url https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
162
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
163
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
164
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
165
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
166
reference_url https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
reference_id
reference_type
scores
url https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
167
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10090
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10090
168
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10091
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10091
169
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10104
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10104
170
reference_url https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
171
reference_url https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
172
reference_url https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
173
reference_url https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
174
reference_url https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
175
reference_url https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E
176
reference_url https://puppet.com/security/cve/poodle-sslv3-vulnerability
reference_id
reference_type
scores
url https://puppet.com/security/cve/poodle-sslv3-vulnerability
177
reference_url https://security.netapp.com/advisory/ntap-20141015-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20141015-0001/
178
reference_url https://support.apple.com/HT205217
reference_id
reference_type
scores
url https://support.apple.com/HT205217
179
reference_url https://support.apple.com/kb/HT6527
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6527
180
reference_url https://support.apple.com/kb/HT6529
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6529
181
reference_url https://support.apple.com/kb/HT6531
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6531
182
reference_url https://support.apple.com/kb/HT6535
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6535
183
reference_url https://support.apple.com/kb/HT6536
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6536
184
reference_url https://support.apple.com/kb/HT6541
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6541
185
reference_url https://support.apple.com/kb/HT6542
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6542
186
reference_url https://support.citrix.com/article/CTX216642
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX216642
187
reference_url https://support.lenovo.com/product_security/poodle
reference_id
reference_type
scores
url https://support.lenovo.com/product_security/poodle
188
reference_url https://support.lenovo.com/us/en/product_security/poodle
reference_id
reference_type
scores
url https://support.lenovo.com/us/en/product_security/poodle
189
reference_url https://technet.microsoft.com/library/security/3009008.aspx
reference_id
reference_type
scores
url https://technet.microsoft.com/library/security/3009008.aspx
190
reference_url https://templatelab.com/ssl-poodle/
reference_id
reference_type
scores
url https://templatelab.com/ssl-poodle/
191
reference_url http://support.apple.com/HT204244
reference_id
reference_type
scores
url http://support.apple.com/HT204244
192
reference_url http://support.citrix.com/article/CTX200238
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX200238
193
reference_url https://www-01.ibm.com/support/docview.wss?uid=swg21688165
reference_id
reference_type
scores
url https://www-01.ibm.com/support/docview.wss?uid=swg21688165
194
reference_url https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
reference_id
reference_type
scores
url https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
195
reference_url https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
reference_id
reference_type
scores
url https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
196
reference_url https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
reference_id
reference_type
scores
url https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
197
reference_url https://www.elastic.co/blog/logstash-1-4-3-released
reference_id
reference_type
scores
url https://www.elastic.co/blog/logstash-1-4-3-released
198
reference_url https://www.imperialviolet.org/2014/10/14/poodle.html
reference_id
reference_type
scores
url https://www.imperialviolet.org/2014/10/14/poodle.html
199
reference_url https://www.openssl.org/~bodo/ssl-poodle.pdf
reference_id
reference_type
scores
url https://www.openssl.org/~bodo/ssl-poodle.pdf
200
reference_url https://www.openssl.org/news/secadv_20141015.txt
reference_id
reference_type
scores
url https://www.openssl.org/news/secadv_20141015.txt
201
reference_url https://www.suse.com/support/kb/doc.php?id=7015773
reference_id
reference_type
scores
url https://www.suse.com/support/kb/doc.php?id=7015773
202
reference_url http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
reference_id
reference_type
scores
url http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
203
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
204
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
205
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21686997
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21686997
206
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21687172
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21687172
207
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21687611
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21687611
208
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
209
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21692299
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21692299
210
reference_url http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
reference_id
reference_type
scores
url http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
211
reference_url http://www.debian.org/security/2014/dsa-3053
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3053
212
reference_url http://www.debian.org/security/2015/dsa-3144
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3144
213
reference_url http://www.debian.org/security/2015/dsa-3147
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3147
214
reference_url http://www.debian.org/security/2015/dsa-3253
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3253
215
reference_url http://www.debian.org/security/2016/dsa-3489
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3489
216
reference_url http://www.kb.cert.org/vuls/id/577193
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/577193
217
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
218
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
219
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
220
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
221
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
222
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
223
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
224
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
225
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
226
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
227
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
228
reference_url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
229
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
230
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
231
reference_url http://www.securityfocus.com/archive/1/533724/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/533724/100/0/threaded
232
reference_url http://www.securityfocus.com/archive/1/533746
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/533746
233
reference_url http://www.securityfocus.com/archive/1/533747
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/533747
234
reference_url http://www.securityfocus.com/bid/70574
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70574
235
reference_url http://www.securitytracker.com/id/1031029
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031029
236
reference_url http://www.securitytracker.com/id/1031039
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031039
237
reference_url http://www.securitytracker.com/id/1031085
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031085
238
reference_url http://www.securitytracker.com/id/1031086
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031086
239
reference_url http://www.securitytracker.com/id/1031087
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031087
240
reference_url http://www.securitytracker.com/id/1031088
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031088
241
reference_url http://www.securitytracker.com/id/1031089
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031089
242
reference_url http://www.securitytracker.com/id/1031090
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031090
243
reference_url http://www.securitytracker.com/id/1031091
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031091
244
reference_url http://www.securitytracker.com/id/1031092
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031092
245
reference_url http://www.securitytracker.com/id/1031093
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031093
246
reference_url http://www.securitytracker.com/id/1031094
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031094
247
reference_url http://www.securitytracker.com/id/1031095
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031095
248
reference_url http://www.securitytracker.com/id/1031096
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031096
249
reference_url http://www.securitytracker.com/id/1031105
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031105
250
reference_url http://www.securitytracker.com/id/1031106
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031106
251
reference_url http://www.securitytracker.com/id/1031107
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031107
252
reference_url http://www.securitytracker.com/id/1031120
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031120
253
reference_url http://www.securitytracker.com/id/1031123
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031123
254
reference_url http://www.securitytracker.com/id/1031124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031124
255
reference_url http://www.securitytracker.com/id/1031130
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031130
256
reference_url http://www.securitytracker.com/id/1031131
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031131
257
reference_url http://www.securitytracker.com/id/1031132
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031132
258
reference_url http://www.ubuntu.com/usn/USN-2486-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2486-1
259
reference_url http://www.ubuntu.com/usn/USN-2487-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2487-1
260
reference_url http://www.us-cert.gov/ncas/alerts/TA14-290A
reference_id
reference_type
scores
url http://www.us-cert.gov/ncas/alerts/TA14-290A
261
reference_url http://www.vmware.com/security/advisories/VMSA-2015-0003.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2015-0003.html
262
reference_url http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
reference_id
reference_type
scores
url http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
263
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152789
reference_id 1152789
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152789
264
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765539
reference_id 765539
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765539
265
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765702
reference_id 765702
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765702
266
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768164
reference_id 768164
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768164
267
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769904
reference_id 769904
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769904
268
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771359
reference_id 771359
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771359
269
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*
270
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*
271
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*
272
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*
273
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*
274
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*
275
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*
276
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*
277
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.5:*:*:*:*:*:*:*
278
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.6:*:*:*:*:*:*:*
279
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.7:*:*:*:*:*:*:*
280
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*
281
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*
282
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*
283
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.1:*:*:*:*:*:*:*
284
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.2:*:*:*:*:*:*:*
285
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.3:*:*:*:*:*:*:*
286
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*
287
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*
288
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*
289
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.1:*:*:*:*:*:*:*
290
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*
291
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*
292
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.4:*:*:*:*:*:*:*
293
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
294
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
295
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
296
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
297
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
298
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
299
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
300
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
301
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
302
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
303
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
304
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
305
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
306
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
307
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
308
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
309
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
310
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
311
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
312
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
313
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
314
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
315
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
316
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
317
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
318
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
319
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
320
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
321
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*
322
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*
323
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*
324
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*
325
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
326
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
327
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
328
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
329
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
330
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
331
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
332
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
333
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
334
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
335
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
336
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
337
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
338
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
339
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
340
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
341
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
342
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
343
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
344
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
345
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
346
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
347
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
348
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
349
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
350
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
351
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
352
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
353
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
354
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
355
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
356
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
357
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
358
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*
359
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*
360
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
361
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
362
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
363
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
364
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
365
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
366
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*
367
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
368
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*
369
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
370
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
371
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
372
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*
373
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*
374
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*
375
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*
376
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*
377
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*
378
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*
379
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*
380
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*
381
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*
382
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*
383
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*
384
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*
385
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*
386
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*
387
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*
388
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*
389
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*
390
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*
391
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*
392
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*
393
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*
394
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*
395
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
396
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*
397
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
398
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
399
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
400
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
401
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
402
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
403
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
404
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
405
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
406
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
407
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
408
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
409
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
410
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
411
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*
412
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
413
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
414
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
415
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:*
416
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3566
reference_id CVE-2014-3566
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-3566
417
reference_url https://security.gentoo.org/glsa/201411-10
reference_id GLSA-201411-10
reference_type
scores
url https://security.gentoo.org/glsa/201411-10
418
reference_url https://security.gentoo.org/glsa/201507-14
reference_id GLSA-201507-14
reference_type
scores
url https://security.gentoo.org/glsa/201507-14
419
reference_url https://security.gentoo.org/glsa/201606-11
reference_id GLSA-201606-11
reference_type
scores
url https://security.gentoo.org/glsa/201606-11
420
reference_url https://access.redhat.com/errata/RHSA-2014:1876
reference_id RHSA-2014:1876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1876
421
reference_url https://access.redhat.com/errata/RHSA-2014:1877
reference_id RHSA-2014:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1877
422
reference_url https://access.redhat.com/errata/RHSA-2014:1880
reference_id RHSA-2014:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1880
423
reference_url https://access.redhat.com/errata/RHSA-2014:1881
reference_id RHSA-2014:1881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1881
424
reference_url https://access.redhat.com/errata/RHSA-2014:1882
reference_id RHSA-2014:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1882
425
reference_url https://access.redhat.com/errata/RHSA-2014:1920
reference_id RHSA-2014:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1920
426
reference_url https://access.redhat.com/errata/RHSA-2015:0010
reference_id RHSA-2015:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0010
427
reference_url https://access.redhat.com/errata/RHSA-2015:0011
reference_id RHSA-2015:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0011
428
reference_url https://access.redhat.com/errata/RHSA-2015:0012
reference_id RHSA-2015:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0012
429
reference_url https://access.redhat.com/errata/RHSA-2015:0067
reference_id RHSA-2015:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0067
430
reference_url https://access.redhat.com/errata/RHSA-2015:0068
reference_id RHSA-2015:0068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0068
431
reference_url https://access.redhat.com/errata/RHSA-2015:0069
reference_id RHSA-2015:0069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0069
432
reference_url https://access.redhat.com/errata/RHSA-2015:0079
reference_id RHSA-2015:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0079
433
reference_url https://access.redhat.com/errata/RHSA-2015:0080
reference_id RHSA-2015:0080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0080
434
reference_url https://access.redhat.com/errata/RHSA-2015:0085
reference_id RHSA-2015:0085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0085
435
reference_url https://access.redhat.com/errata/RHSA-2015:0086
reference_id RHSA-2015:0086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0086
436
reference_url https://access.redhat.com/errata/RHSA-2015:0264
reference_id RHSA-2015:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0264
437
reference_url https://access.redhat.com/errata/RHSA-2015:1545
reference_id RHSA-2015:1545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1545
438
reference_url https://access.redhat.com/errata/RHSA-2015:1546
reference_id RHSA-2015:1546
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1546
439
reference_url https://usn.ubuntu.com/2486-1/
reference_id USN-2486-1
reference_type
scores
url https://usn.ubuntu.com/2486-1/
440
reference_url https://usn.ubuntu.com/2487-1/
reference_id USN-2487-1
reference_type
scores
url https://usn.ubuntu.com/2487-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.17.2-1.1
purl pkg:deb/debian/nss@2:3.17.2-1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w58-mdmk-guh8
1
vulnerability VCID-2w9f-avet-g7c5
2
vulnerability VCID-2zrv-q4tb-wqeg
3
vulnerability VCID-46cy-x3cp-tke5
4
vulnerability VCID-5wqt-2dtu-8qa4
5
vulnerability VCID-6fvj-phnx-kfgs
6
vulnerability VCID-7msj-wyd6-zkbe
7
vulnerability VCID-8qtg-h4km-bfg2
8
vulnerability VCID-9mux-fuyc-a7dx
9
vulnerability VCID-cgvg-aj53-kkbp
10
vulnerability VCID-dh3c-g3k3-zkb7
11
vulnerability VCID-dk4z-1j37-aucx
12
vulnerability VCID-ekxy-vaed-u7cg
13
vulnerability VCID-ewe9-39b1-kba2
14
vulnerability VCID-fgv4-bz59-h7g7
15
vulnerability VCID-gfj6-dsud-g3fh
16
vulnerability VCID-hs5f-21nx-gfeb
17
vulnerability VCID-hs79-pemh-vfd6
18
vulnerability VCID-jmhk-12t1-kugh
19
vulnerability VCID-jrsz-ynp7-wbb2
20
vulnerability VCID-jvrr-2gej-bfby
21
vulnerability VCID-k2s2-zkua-8ydy
22
vulnerability VCID-k4a4-f1as-x3bj
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-mwyu-5rk2-xbbz
25
vulnerability VCID-mx8t-s47w-wud5
26
vulnerability VCID-paez-g9wh-mfeq
27
vulnerability VCID-pc13-zwmr-p7hz
28
vulnerability VCID-qup9-qy11-fqhe
29
vulnerability VCID-rk7t-zjzg-eqar
30
vulnerability VCID-rzqy-gheq-cqgg
31
vulnerability VCID-szzk-wxm2-cfgj
32
vulnerability VCID-t89f-eksr-juen
33
vulnerability VCID-ukuz-m6d3-5kab
34
vulnerability VCID-vjas-pry4-93cz
35
vulnerability VCID-vszp-vyxy-f7g7
36
vulnerability VCID-vzb9-aeqz-hybr
37
vulnerability VCID-w794-gqex-83du
38
vulnerability VCID-wavp-f4kn-j3cm
39
vulnerability VCID-wut5-sqr6-mubd
40
vulnerability VCID-x1ty-wqph-gkak
41
vulnerability VCID-y43f-tmvr-hqas
42
vulnerability VCID-ykkw-a6a1-43fe
43
vulnerability VCID-z26z-btvf-x7eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1
aliases CVE-2014-3566
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xap5-djda-2uem
Risk_score7.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.17.2-1.1