{"url":"http://public2.vulnerablecode.io/api/packages/123910?format=json","purl":"pkg:rpm/redhat/xulrunner@17.0.8-3?arch=el5_9","type":"rpm","namespace":"redhat","name":"xulrunner","version":"17.0.8-3","qualifiers":{"arch":"el5_9"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46465?format=json","vulnerability_id":"VCID-1twv-z77f-yqfb","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1714.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1714.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1714","reference_id":"","reference_type":"","scores":[{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77962","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77808","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77842","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77824","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77868","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77904","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77903","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77929","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.77936","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01083","scoring_system":"epss","scoring_elements":"0.7795","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=993604","reference_id":"993604","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=993604"},{"reference_url":"https://security.gentoo.org/glsa/201309-23","reference_id":"GLSA-201309-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-23"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-73","reference_id":"mfsa2013-73","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-73"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1140","reference_id":"RHSA-2013:1140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1142","reference_id":"RHSA-2013:1142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1142"},{"reference_url":"https://usn.ubuntu.com/1924-1/","reference_id":"USN-1924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1924-1/"},{"reference_url":"https://usn.ubuntu.com/1925-1/","reference_id":"USN-1925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1925-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1714"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1twv-z77f-yqfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46460?format=json","vulnerability_id":"VCID-3f3t-kpkz-hfh2","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1710.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1710.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1710","reference_id":"","reference_type":"","scores":[{"value":"0.76472","scoring_system":"epss","scoring_elements":"0.98954","published_at":"2026-05-05T12:55:00Z"},{"value":"0.76472","scoring_system":"epss","scoring_elements":"0.98927","published_at":"2026-04-01T12:55:00Z"},{"value":"0.76472","scoring_system":"epss","scoring_elements":"0.98928","published_at":"2026-04-02T12:55:00Z"},{"value":"0.76472","scoring_system":"epss","scoring_elements":"0.9893","published_at":"2026-04-04T12:55:00Z"},{"value":"0.76472","scoring_system":"epss","scoring_elements":"0.98932","published_at":"2026-04-07T12:55:00Z"},{"value":"0.76472","scoring_system":"epss","scoring_elements":"0.98934","published_at":"2026-04-09T12:55:00Z"},{"value":"0.76472","scoring_system":"epss","scoring_elements":"0.98936","published_at":"2026-04-11T12:55:00Z"},{"value":"0.76472","scoring_system":"epss","scoring_elements":"0.98937","published_at":"2026-04-13T12:55:00Z"},{"value":"0.76472","scoring_system":"epss","scoring_elements":"0.9894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.76472","scoring_system":"epss","scoring_elements":"0.98941","published_at":"2026-04-18T12:55:00Z"},{"value":"0.76472","scoring_system":"epss","scoring_elements":"0.98942","published_at":"2026-04-21T12:55:00Z"},{"value":"0.76472","scoring_system":"epss","scoring_elements":"0.98946","published_at":"2026-04-26T12:55:00Z"},{"value":"0.76472","scoring_system":"epss","scoring_elements":"0.98948","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=993602","reference_id":"993602","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=993602"},{"reference_url":"https://security.gentoo.org/glsa/201309-23","reference_id":"GLSA-201309-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-23"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-69","reference_id":"mfsa2013-69","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-69"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1140","reference_id":"RHSA-2013:1140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1142","reference_id":"RHSA-2013:1142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1142"},{"reference_url":"https://usn.ubuntu.com/1924-1/","reference_id":"USN-1924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1924-1/"},{"reference_url":"https://usn.ubuntu.com/1925-1/","reference_id":"USN-1925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1925-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1710"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3f3t-kpkz-hfh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46463?format=json","vulnerability_id":"VCID-8tpd-hn73-byb1","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1713.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1713.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1713","reference_id":"","reference_type":"","scores":[{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64424","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64303","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64357","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64386","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64345","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64394","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64409","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64421","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.6438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64416","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64427","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64419","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64453","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64451","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=993603","reference_id":"993603","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=993603"},{"reference_url":"https://security.gentoo.org/glsa/201309-23","reference_id":"GLSA-201309-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-23"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-72","reference_id":"mfsa2013-72","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-72"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1140","reference_id":"RHSA-2013:1140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1142","reference_id":"RHSA-2013:1142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1142"},{"reference_url":"https://usn.ubuntu.com/1924-1/","reference_id":"USN-1924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1924-1/"},{"reference_url":"https://usn.ubuntu.com/1925-1/","reference_id":"USN-1925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1925-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1713"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8tpd-hn73-byb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46457?format=json","vulnerability_id":"VCID-mue1-gvrf-27e2","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1709.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1709.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1709","reference_id":"","reference_type":"","scores":[{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66879","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.6677","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66809","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66889","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66875","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66843","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66876","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.6689","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66873","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66898","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66911","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66908","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=993600","reference_id":"993600","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=993600"},{"reference_url":"https://security.gentoo.org/glsa/201309-23","reference_id":"GLSA-201309-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-23"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-68","reference_id":"mfsa2013-68","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-68"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1140","reference_id":"RHSA-2013:1140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1142","reference_id":"RHSA-2013:1142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1142"},{"reference_url":"https://usn.ubuntu.com/1924-1/","reference_id":"USN-1924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1924-1/"},{"reference_url":"https://usn.ubuntu.com/1925-1/","reference_id":"USN-1925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1925-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1709"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mue1-gvrf-27e2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46466?format=json","vulnerability_id":"VCID-nutc-y3ue-tkdd","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1717.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1717.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1717","reference_id":"","reference_type":"","scores":[{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68657","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68523","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.6856","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68606","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68632","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68619","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.6859","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68629","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68641","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68667","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68677","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=993605","reference_id":"993605","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=993605"},{"reference_url":"https://security.gentoo.org/glsa/201309-23","reference_id":"GLSA-201309-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-23"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-75","reference_id":"mfsa2013-75","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-75"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1140","reference_id":"RHSA-2013:1140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1142","reference_id":"RHSA-2013:1142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1142"},{"reference_url":"https://usn.ubuntu.com/1924-1/","reference_id":"USN-1924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1924-1/"},{"reference_url":"https://usn.ubuntu.com/1925-1/","reference_id":"USN-1925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1925-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1717"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nutc-y3ue-tkdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46447?format=json","vulnerability_id":"VCID-p9xu-m3ac-ukf9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1701.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1701.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1701","reference_id":"","reference_type":"","scores":[{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87742","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87639","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87649","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87662","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87663","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87684","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.8769","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87702","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87708","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87704","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87722","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87728","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03551","scoring_system":"epss","scoring_elements":"0.87727","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=993598","reference_id":"993598","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=993598"},{"reference_url":"https://security.gentoo.org/glsa/201309-23","reference_id":"GLSA-201309-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-23"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-63","reference_id":"mfsa2013-63","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-63"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1140","reference_id":"RHSA-2013:1140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1142","reference_id":"RHSA-2013:1142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1142"},{"reference_url":"https://usn.ubuntu.com/1924-1/","reference_id":"USN-1924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1924-1/"},{"reference_url":"https://usn.ubuntu.com/1925-1/","reference_id":"USN-1925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1925-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1701"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p9xu-m3ac-ukf9"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xulrunner@17.0.8-3%3Farch=el5_9"}