{"url":"http://public2.vulnerablecode.io/api/packages/117370?format=json","purl":"pkg:rpm/redhat/thunderbird@31.8.0-1?arch=el6_6","type":"rpm","namespace":"redhat","name":"thunderbird","version":"31.8.0-1","qualifiers":{"arch":"el6_6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41205?format=json","vulnerability_id":"VCID-1b4y-74dy-bfg3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2738.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2738.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2738","reference_id":"","reference_type":"","scores":[{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79525","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79293","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7931","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79343","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79421","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79429","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79451","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79468","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79487","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956","reference_id":"1236956","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66","reference_id":"mfsa2015-66","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[],"aliases":["CVE-2015-2738"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1b4y-74dy-bfg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41187?format=json","vulnerability_id":"VCID-1k4n-9zjx-d3bu","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2736.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2736.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2736","reference_id":"","reference_type":"","scores":[{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78998","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78807","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78814","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78827","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78858","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78882","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78884","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78878","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78907","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78915","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78932","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78948","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.7897","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78984","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78981","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81896","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956","reference_id":"1236956","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66","reference_id":"mfsa2015-66","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[],"aliases":["CVE-2015-2736"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1k4n-9zjx-d3bu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41197?format=json","vulnerability_id":"VCID-f677-m1p3-nqdq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2737.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2737.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2737","reference_id":"","reference_type":"","scores":[{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79525","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79293","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7931","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79343","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79421","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79429","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79451","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79468","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79487","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956","reference_id":"1236956","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66","reference_id":"mfsa2015-66","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[],"aliases":["CVE-2015-2737"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f677-m1p3-nqdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41210?format=json","vulnerability_id":"VCID-fubs-3mtf-77c7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2739.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2739.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2739","reference_id":"","reference_type":"","scores":[{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77748","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77498","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77503","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77542","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77553","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77551","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77589","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77587","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77581","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77616","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77638","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77648","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77677","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77695","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77684","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77702","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956","reference_id":"1236956","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66","reference_id":"mfsa2015-66","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[],"aliases":["CVE-2015-2739"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fubs-3mtf-77c7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41097?format=json","vulnerability_id":"VCID-gwtj-tnhj-wfev","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2725.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2725.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2725","reference_id":"","reference_type":"","scores":[{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.82064","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81803","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81836","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.8186","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81867","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81885","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81873","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81868","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81905","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81907","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.8193","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81941","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81946","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81965","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.81985","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.8201","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.82007","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01627","scoring_system":"epss","scoring_elements":"0.82023","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2725"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236947","reference_id":"1236947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725","reference_id":"CVE-2015-2725","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-59","reference_id":"mfsa2015-59","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-59"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"}],"fixed_packages":[],"aliases":["CVE-2015-2725"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gwtj-tnhj-wfev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41130?format=json","vulnerability_id":"VCID-k6eg-55x2-dyh5","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2731.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2731.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2731","reference_id":"","reference_type":"","scores":[{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76483","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76247","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.7625","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76293","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76334","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76312","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76347","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76337","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.7638","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76381","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.7641","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.7643","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76418","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76434","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236953","reference_id":"1236953","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236953"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-63","reference_id":"mfsa2015-63","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-63"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"}],"fixed_packages":[],"aliases":["CVE-2015-2731"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k6eg-55x2-dyh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41211?format=json","vulnerability_id":"VCID-kj6v-kvbx-33b5","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2740.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2740.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2740","reference_id":"","reference_type":"","scores":[{"value":"0.02632","scoring_system":"epss","scoring_elements":"0.85846","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87522","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87545","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87548","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87567","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87573","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87585","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.8758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87577","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87591","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87608","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87613","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87626","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87643","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87661","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87657","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.8767","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03486","scoring_system":"epss","scoring_elements":"0.87592","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956","reference_id":"1236956","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66","reference_id":"mfsa2015-66","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[],"aliases":["CVE-2015-2740"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kj6v-kvbx-33b5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41161?format=json","vulnerability_id":"VCID-kyhs-j9aj-vqft","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2734","reference_id":"","reference_type":"","scores":[{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79525","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79293","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7931","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79343","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79421","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79429","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79451","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79468","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79487","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956","reference_id":"1236956","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66","reference_id":"mfsa2015-66","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[],"aliases":["CVE-2015-2734"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kyhs-j9aj-vqft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41176?format=json","vulnerability_id":"VCID-pdjg-gn54-9bcq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2735.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2735.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2735","reference_id":"","reference_type":"","scores":[{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78998","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78807","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78814","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78827","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78858","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78882","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78884","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78878","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78907","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78915","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78932","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78948","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.7897","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78984","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78981","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81896","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956","reference_id":"1236956","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66","reference_id":"mfsa2015-66","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[],"aliases":["CVE-2015-2735"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pdjg-gn54-9bcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41212?format=json","vulnerability_id":"VCID-ua69-cwm3-8ubh","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2741.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2741.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2741","reference_id":"","reference_type":"","scores":[{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62402","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62147","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62207","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62237","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62204","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62289","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62279","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62257","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62303","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6231","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6232","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62314","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62261","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62367","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62347","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2741"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236963","reference_id":"1236963","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236963"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741","reference_id":"CVE-2015-2741","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-67","reference_id":"mfsa2015-67","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-67"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"}],"fixed_packages":[],"aliases":["CVE-2015-2741"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ua69-cwm3-8ubh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41095?format=json","vulnerability_id":"VCID-xjf8-mc7t-hfah","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2724","reference_id":"","reference_type":"","scores":[{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.7605","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75798","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75802","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75813","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75881","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75855","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75893","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75896","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75882","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75919","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75929","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.7594","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75948","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75978","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.76002","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75986","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.76","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236947","reference_id":"1236947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236947"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-59","reference_id":"mfsa2015-59","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-59"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[],"aliases":["CVE-2015-2724"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xjf8-mc7t-hfah"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@31.8.0-1%3Farch=el6_6"}