{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","type":"ebuild","namespace":"www-client","name":"seamonkey","version":"31.5.3","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61190?format=json","vulnerability_id":"VCID-18ut-jmww-bffq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5591.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5591.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5591","reference_id":"","reference_type":"","scores":[{"value":"0.03454","scoring_system":"epss","scoring_elements":"0.87519","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03454","scoring_system":"epss","scoring_elements":"0.87463","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03454","scoring_system":"epss","scoring_elements":"0.87473","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03454","scoring_system":"epss","scoring_elements":"0.87487","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03454","scoring_system":"epss","scoring_elements":"0.8749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03454","scoring_system":"epss","scoring_elements":"0.87509","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03454","scoring_system":"epss","scoring_elements":"0.87516","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03454","scoring_system":"epss","scoring_elements":"0.87527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03454","scoring_system":"epss","scoring_elements":"0.87523","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5591"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023846","reference_id":"1023846","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5591","reference_id":"CVE-2013-5591","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5591"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-93","reference_id":"mfsa2013-93","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-93"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"},{"reference_url":"https://usn.ubuntu.com/2010-1/","reference_id":"USN-2010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5591"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-18ut-jmww-bffq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54767?format=json","vulnerability_id":"VCID-1ert-2qyc-cfc1","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1492.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1492","reference_id":"","reference_type":"","scores":[{"value":"0.00829","scoring_system":"epss","scoring_elements":"0.74517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00829","scoring_system":"epss","scoring_elements":"0.74471","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00829","scoring_system":"epss","scoring_elements":"0.74474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00829","scoring_system":"epss","scoring_elements":"0.745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00829","scoring_system":"epss","scoring_elements":"0.74475","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00829","scoring_system":"epss","scoring_elements":"0.74507","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00829","scoring_system":"epss","scoring_elements":"0.74523","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00829","scoring_system":"epss","scoring_elements":"0.74544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00829","scoring_system":"epss","scoring_elements":"0.74525","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079851","reference_id":"1079851","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079851"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-45","reference_id":"mfsa2014-45","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-45"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0917","reference_id":"RHSA-2014:0917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1073","reference_id":"RHSA-2014:1073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1246","reference_id":"RHSA-2014:1246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1246"},{"reference_url":"https://usn.ubuntu.com/2159-1/","reference_id":"USN-2159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2159-1/"},{"reference_url":"https://usn.ubuntu.com/2185-1/","reference_id":"USN-2185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2185-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1492"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ert-2qyc-cfc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61222?format=json","vulnerability_id":"VCID-1ntg-ddgs-tfhw","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1520","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11599","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11552","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11678","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11721","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11592","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11652","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11663","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11626","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520","reference_id":"CVE-2014-1520","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-35","reference_id":"mfsa2014-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-35"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1520"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ntg-ddgs-tfhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61254?format=json","vulnerability_id":"VCID-1ytq-j1bc-cbg6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1560.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1560.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1560","reference_id":"","reference_type":"","scores":[{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68321","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68256","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68366","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68276","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68296","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.6834","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1560"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=997795","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=997795"},{"reference_url":"http://secunia.com/advisories/60628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60628"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-65.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-65.html"},{"reference_url":"http://www.securitytracker.com/id/1030619","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030619"},{"reference_url":"http://www.securitytracker.com/id/1030620","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121480","reference_id":"1121480","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121480"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1560","reference_id":"CVE-2014-1560","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1560"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1560","reference_id":"CVE-2014-1560","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1560"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-65","reference_id":"mfsa2014-65","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-65"},{"reference_url":"https://usn.ubuntu.com/2295-1/","reference_id":"USN-2295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2295-1/"},{"reference_url":"https://usn.ubuntu.com/2296-1/","reference_id":"USN-2296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2296-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1560"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ytq-j1bc-cbg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56694?format=json","vulnerability_id":"VCID-24qn-29xp-93cr","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1493.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1493.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1493","reference_id":"","reference_type":"","scores":[{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80902","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80843","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80852","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80875","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80872","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80909","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80925","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80911","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077013","reference_id":"1077013","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077013"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-15","reference_id":"mfsa2014-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0310","reference_id":"RHSA-2014:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0316","reference_id":"RHSA-2014:0316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0316"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"},{"reference_url":"https://usn.ubuntu.com/2151-1/","reference_id":"USN-2151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2151-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1493"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-24qn-29xp-93cr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55681?format=json","vulnerability_id":"VCID-29gb-hk74-myfk","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5604.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5604.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5604","reference_id":"","reference_type":"","scores":[{"value":"0.06864","scoring_system":"epss","scoring_elements":"0.9137","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06864","scoring_system":"epss","scoring_elements":"0.9132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06864","scoring_system":"epss","scoring_elements":"0.91325","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06864","scoring_system":"epss","scoring_elements":"0.91335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06864","scoring_system":"epss","scoring_elements":"0.91342","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06864","scoring_system":"epss","scoring_elements":"0.91354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06864","scoring_system":"epss","scoring_elements":"0.91361","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06864","scoring_system":"epss","scoring_elements":"0.91368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06864","scoring_system":"epss","scoring_elements":"0.91371","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023863","reference_id":"1023863","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023863"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-95","reference_id":"mfsa2013-95","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-95"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1476","reference_id":"RHSA-2013:1476","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1480","reference_id":"RHSA-2013:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1480"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"},{"reference_url":"https://usn.ubuntu.com/2010-1/","reference_id":"USN-2010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5604"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-29gb-hk74-myfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61194?format=json","vulnerability_id":"VCID-2kyd-fwqg-qufp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5598.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5598.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5598","reference_id":"","reference_type":"","scores":[{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.7369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73641","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.7365","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73647","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73682","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73699","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5598"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023842","reference_id":"1023842","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5598","reference_id":"CVE-2013-5598","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5598"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-99","reference_id":"mfsa2013-99","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-99"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5598"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2kyd-fwqg-qufp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61224?format=json","vulnerability_id":"VCID-2uha-ku3u-q3ac","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1525.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1525.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1525","reference_id":"","reference_type":"","scores":[{"value":"0.01864","scoring_system":"epss","scoring_elements":"0.83059","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01864","scoring_system":"epss","scoring_elements":"0.82994","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01864","scoring_system":"epss","scoring_elements":"0.83011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01864","scoring_system":"epss","scoring_elements":"0.83024","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01864","scoring_system":"epss","scoring_elements":"0.83022","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01864","scoring_system":"epss","scoring_elements":"0.83047","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01864","scoring_system":"epss","scoring_elements":"0.83054","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01864","scoring_system":"epss","scoring_elements":"0.8307","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01864","scoring_system":"epss","scoring_elements":"0.83064","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1525"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1095070","reference_id":"1095070","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1095070"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1525","reference_id":"CVE-2014-1525","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1525"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-39","reference_id":"mfsa2014-39","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-39"},{"reference_url":"https://usn.ubuntu.com/2185-1/","reference_id":"USN-2185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2185-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1525"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2uha-ku3u-q3ac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55675?format=json","vulnerability_id":"VCID-2yj1-m2c9-syfa","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5595.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5595.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5595","reference_id":"","reference_type":"","scores":[{"value":"0.02577","scoring_system":"epss","scoring_elements":"0.8556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02577","scoring_system":"epss","scoring_elements":"0.85488","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02577","scoring_system":"epss","scoring_elements":"0.85501","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02577","scoring_system":"epss","scoring_elements":"0.85517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02577","scoring_system":"epss","scoring_elements":"0.85522","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02577","scoring_system":"epss","scoring_elements":"0.85542","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02577","scoring_system":"epss","scoring_elements":"0.85552","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02577","scoring_system":"epss","scoring_elements":"0.85566","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02577","scoring_system":"epss","scoring_elements":"0.85564","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023839","reference_id":"1023839","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023839"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-96","reference_id":"mfsa2013-96","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-96"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1476","reference_id":"RHSA-2013:1476","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1480","reference_id":"RHSA-2013:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1480"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"},{"reference_url":"https://usn.ubuntu.com/2010-1/","reference_id":"USN-2010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5595"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2yj1-m2c9-syfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61231?format=json","vulnerability_id":"VCID-3cxj-t9e2-q3hj","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1542.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1542.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1542","reference_id":"","reference_type":"","scores":[{"value":"0.04721","scoring_system":"epss","scoring_elements":"0.89386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04721","scoring_system":"epss","scoring_elements":"0.89344","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04721","scoring_system":"epss","scoring_elements":"0.89392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04721","scoring_system":"epss","scoring_elements":"0.8939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04721","scoring_system":"epss","scoring_elements":"0.89349","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04721","scoring_system":"epss","scoring_elements":"0.89361","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04721","scoring_system":"epss","scoring_elements":"0.89363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04721","scoring_system":"epss","scoring_elements":"0.8938","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04721","scoring_system":"epss","scoring_elements":"0.89384","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1542"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=991533","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=991533"},{"reference_url":"http://secunia.com/advisories/59052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59052"},{"reference_url":"http://secunia.com/advisories/59171","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59171"},{"reference_url":"http://secunia.com/advisories/59387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59387"},{"reference_url":"http://secunia.com/advisories/59486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59486"},{"reference_url":"http://secunia.com/advisories/59866","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59866"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-53.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-53.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/67968","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/67968"},{"reference_url":"http://www.securitytracker.com/id/1030388","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030388"},{"reference_url":"http://www.ubuntu.com/usn/USN-2243-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2243-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107425","reference_id":"1107425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1542","reference_id":"CVE-2014-1542","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1542"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1542","reference_id":"CVE-2014-1542","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1542"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-53","reference_id":"mfsa2014-53","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-53"},{"reference_url":"https://usn.ubuntu.com/2243-1/","reference_id":"USN-2243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2243-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1542"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3cxj-t9e2-q3hj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56935?format=json","vulnerability_id":"VCID-3hsx-gtzg-duhf","summary":"security update","references":[{"reference_url":"http://linux.oracle.com/errata/ELSA-2014-0918.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2014-0918.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1556.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1556.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1556","reference_id":"","reference_type":"","scores":[{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.7561","published_at":"2026-04-01T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75612","published_at":"2026-04-02T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75642","published_at":"2026-04-04T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75656","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1556"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1028891","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1028891"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557"},{"reference_url":"http://secunia.com/advisories/59591","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59591"},{"reference_url":"http://secunia.com/advisories/59719","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59719"},{"reference_url":"http://secunia.com/advisories/59760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59760"},{"reference_url":"http://secunia.com/advisories/60083","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60083"},{"reference_url":"http://secunia.com/advisories/60306","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60306"},{"reference_url":"http://secunia.com/advisories/60486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60486"},{"reference_url":"http://secunia.com/advisories/60621","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60621"},{"reference_url":"http://secunia.com/advisories/60628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60628"},{"reference_url":"http://www.debian.org/security/2014/dsa-2986","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2986"},{"reference_url":"http://www.debian.org/security/2014/dsa-2996","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2996"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-62.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-62.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/68822","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68822"},{"reference_url":"http://www.securitytracker.com/id/1030619","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030619"},{"reference_url":"http://www.securitytracker.com/id/1030620","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121478","reference_id":"1121478","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121478"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1556","reference_id":"CVE-2014-1556","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1556"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-62","reference_id":"mfsa2014-62","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-62"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0918","reference_id":"RHSA-2014:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0919","reference_id":"RHSA-2014:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0919"},{"reference_url":"https://usn.ubuntu.com/2295-1/","reference_id":"USN-2295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2295-1/"},{"reference_url":"https://usn.ubuntu.com/2296-1/","reference_id":"USN-2296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2296-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1556"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3hsx-gtzg-duhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61259?format=json","vulnerability_id":"VCID-3n3r-1ucq-pye4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1563.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1563.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1563","reference_id":"","reference_type":"","scores":[{"value":"0.0144","scoring_system":"epss","scoring_elements":"0.80719","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0144","scoring_system":"epss","scoring_elements":"0.80661","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0144","scoring_system":"epss","scoring_elements":"0.80741","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0144","scoring_system":"epss","scoring_elements":"0.80727","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0144","scoring_system":"epss","scoring_elements":"0.8067","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0144","scoring_system":"epss","scoring_elements":"0.80691","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0144","scoring_system":"epss","scoring_elements":"0.80686","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0144","scoring_system":"epss","scoring_elements":"0.80715","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0144","scoring_system":"epss","scoring_elements":"0.80725","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1563"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1018524","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1018524"},{"reference_url":"http://secunia.com/advisories/60148","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60148"},{"reference_url":"http://secunia.com/advisories/61114","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61114"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-68.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-68.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/69523","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69523"},{"reference_url":"http://www.securitytracker.com/id/1030793","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030793"},{"reference_url":"http://www.securitytracker.com/id/1030794","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030794"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135864","reference_id":"1135864","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135864"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563","reference_id":"CVE-2014-1563","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1563","reference_id":"CVE-2014-1563","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1563"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-68","reference_id":"mfsa2014-68","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-68"},{"reference_url":"https://usn.ubuntu.com/2329-1/","reference_id":"USN-2329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2329-1/"},{"reference_url":"https://usn.ubuntu.com/2330-1/","reference_id":"USN-2330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2330-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1563"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3n3r-1ucq-pye4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61210?format=json","vulnerability_id":"VCID-3vxn-zjpx-4ff5","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1483.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1483.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1483","reference_id":"","reference_type":"","scores":[{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51139","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51135","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51132","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51176","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51154","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1483"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060943","reference_id":"1060943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060943"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483","reference_id":"CVE-2014-1483","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-05","reference_id":"mfsa2014-05","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-05"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1483"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3vxn-zjpx-4ff5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61223?format=json","vulnerability_id":"VCID-3vyb-n8e7-k7f7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1522.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1522.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1522","reference_id":"","reference_type":"","scores":[{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73314","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73323","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.7332","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73356","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.7337","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73393","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73373","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1522"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1095066","reference_id":"1095066","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1095066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1522","reference_id":"CVE-2014-1522","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1522"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-36","reference_id":"mfsa2014-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-36"},{"reference_url":"https://usn.ubuntu.com/2185-1/","reference_id":"USN-2185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2185-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1522"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3vyb-n8e7-k7f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59586?format=json","vulnerability_id":"VCID-45ek-y9nx-j3cd","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0831","reference_id":"","reference_type":"","scores":[{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83754","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83688","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83715","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83718","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83759","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195619","reference_id":"1195619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195619"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-16","reference_id":"mfsa2015-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0265","reference_id":"RHSA-2015:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0266","reference_id":"RHSA-2015:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0629","reference_id":"RHSA-2015:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0642","reference_id":"RHSA-2015:0642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0642"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"},{"reference_url":"https://usn.ubuntu.com/2506-1/","reference_id":"USN-2506-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2506-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0831"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45ek-y9nx-j3cd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56916?format=json","vulnerability_id":"VCID-49hp-8pm6-vkhr","summary":"security update","references":[{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1545.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1545.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1545","reference_id":"","reference_type":"","scores":[{"value":"0.02889","scoring_system":"epss","scoring_elements":"0.86314","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02889","scoring_system":"epss","scoring_elements":"0.86249","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02889","scoring_system":"epss","scoring_elements":"0.8632","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02889","scoring_system":"epss","scoring_elements":"0.86318","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02889","scoring_system":"epss","scoring_elements":"0.86258","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02889","scoring_system":"epss","scoring_elements":"0.86276","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02889","scoring_system":"epss","scoring_elements":"0.86278","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02889","scoring_system":"epss","scoring_elements":"0.86296","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02889","scoring_system":"epss","scoring_elements":"0.86306","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1545"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1018783","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1018783"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545"},{"reference_url":"http://secunia.com/advisories/58984","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/58984"},{"reference_url":"http://secunia.com/advisories/59229","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59229"},{"reference_url":"http://secunia.com/advisories/59275","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59275"},{"reference_url":"http://secunia.com/advisories/59318","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59318"},{"reference_url":"http://secunia.com/advisories/59377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59377"},{"reference_url":"http://secunia.com/advisories/59387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59387"},{"reference_url":"http://secunia.com/advisories/59425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59425"},{"reference_url":"http://secunia.com/advisories/59486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59486"},{"reference_url":"http://secunia.com/advisories/59614","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59614"},{"reference_url":"http://www.debian.org/security/2014/dsa-2955","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2955"},{"reference_url":"http://www.debian.org/security/2014/dsa-2960","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2960"},{"reference_url":"http://www.debian.org/security/2014/dsa-2962","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2962"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-55.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-55.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/67975","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/67975"},{"reference_url":"http://www.securitytracker.com/id/1030404","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030404"},{"reference_url":"http://www.ubuntu.com/usn/USN-2265-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2265-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107432","reference_id":"1107432","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107432"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1545","reference_id":"CVE-2014-1545","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1545"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-55","reference_id":"mfsa2014-55","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-55"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0917","reference_id":"RHSA-2014:0917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1246","reference_id":"RHSA-2014:1246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1246"},{"reference_url":"https://usn.ubuntu.com/2265-1/","reference_id":"USN-2265-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2265-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1545"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-49hp-8pm6-vkhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61301?format=json","vulnerability_id":"VCID-4dvq-ta2c-s7fp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0826.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0826.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0826","reference_id":"","reference_type":"","scores":[{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71898","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71906","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71924","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71897","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71971","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71954","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0826"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195629","reference_id":"1195629","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826","reference_id":"CVE-2015-0826","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-20","reference_id":"mfsa2015-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-20"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0826"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4dvq-ta2c-s7fp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57039?format=json","vulnerability_id":"VCID-4vhr-24e3-d3d2","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1593.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1593.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1593","reference_id":"","reference_type":"","scores":[{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84106","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84038","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84117","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.8411","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84068","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84069","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84099","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1593"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1085175","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1085175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"http://www.debian.org/security/2014/dsa-3090","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3090"},{"reference_url":"http://www.debian.org/security/2014/dsa-3092","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3092"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-88.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-88.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/71395","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71395"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169209","reference_id":"1169209","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169209"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1593","reference_id":"CVE-2014-1593","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1593"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-88","reference_id":"mfsa2014-88","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-88"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1919","reference_id":"RHSA-2014:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1924","reference_id":"RHSA-2014:1924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1924"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"},{"reference_url":"https://usn.ubuntu.com/2428-1/","reference_id":"USN-2428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1593"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4vhr-24e3-d3d2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56974?format=json","vulnerability_id":"VCID-4xgr-unyn-jkfj","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1578.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1578.json"},{"reference_url":"https://advisories.mageia.org/MGASA-2014-0421.html","reference_id":"","reference_type":"","scores":[],"url":"https://advisories.mageia.org/MGASA-2014-0421.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1578","reference_id":"","reference_type":"","scores":[{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81964","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.8198","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81908","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.8193","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81927","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81961","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1578"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1063327","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1063327"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586"},{"reference_url":"http://secunia.com/advisories/61387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61387"},{"reference_url":"http://secunia.com/advisories/61854","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61854"},{"reference_url":"http://secunia.com/advisories/62021","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62021"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.debian.org/security/2014/dsa-3050","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3050"},{"reference_url":"http://www.debian.org/security/2014/dsa-3061","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3061"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-77.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-77.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/70428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70428"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.securitytracker.com/id/1031030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031030"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2373-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2373-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152361","reference_id":"1152361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152361"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765435","reference_id":"765435","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765435"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1578","reference_id":"CVE-2014-1578","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1578"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-77","reference_id":"mfsa2014-77","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-77"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1635","reference_id":"RHSA-2014:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1647","reference_id":"RHSA-2014:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1647"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"},{"reference_url":"https://usn.ubuntu.com/2373-1/","reference_id":"USN-2373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1578"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4xgr-unyn-jkfj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56703?format=json","vulnerability_id":"VCID-4yww-etfw-cug5","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1511.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1511","reference_id":"","reference_type":"","scores":[{"value":"0.70488","scoring_system":"epss","scoring_elements":"0.9869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.70488","scoring_system":"epss","scoring_elements":"0.98678","published_at":"2026-04-01T12:55:00Z"},{"value":"0.70488","scoring_system":"epss","scoring_elements":"0.98679","published_at":"2026-04-02T12:55:00Z"},{"value":"0.70488","scoring_system":"epss","scoring_elements":"0.98682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.70488","scoring_system":"epss","scoring_elements":"0.98685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.70488","scoring_system":"epss","scoring_elements":"0.98686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.70488","scoring_system":"epss","scoring_elements":"0.98687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.70488","scoring_system":"epss","scoring_elements":"0.98689","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077490","reference_id":"1077490","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077490"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-29","reference_id":"mfsa2014-29","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0310","reference_id":"RHSA-2014:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0316","reference_id":"RHSA-2014:0316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0316"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"},{"reference_url":"https://usn.ubuntu.com/2151-1/","reference_id":"USN-2151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2151-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1511"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4yww-etfw-cug5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56806?format=json","vulnerability_id":"VCID-52kt-axpr-vydx","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1523.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1523.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1523","reference_id":"","reference_type":"","scores":[{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67606","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67529","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67565","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67629","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67652","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67638","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092660","reference_id":"1092660","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092660"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-37","reference_id":"mfsa2014-37","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-37"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0448","reference_id":"RHSA-2014:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0449","reference_id":"RHSA-2014:0449","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0449"},{"reference_url":"https://usn.ubuntu.com/2185-1/","reference_id":"USN-2185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2185-1/"},{"reference_url":"https://usn.ubuntu.com/2189-1/","reference_id":"USN-2189-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2189-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1523"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-52kt-axpr-vydx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56804?format=json","vulnerability_id":"VCID-5fwj-z7cg-rubb","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1518.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1518.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1518","reference_id":"","reference_type":"","scores":[{"value":"0.02818","scoring_system":"epss","scoring_elements":"0.8615","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02818","scoring_system":"epss","scoring_elements":"0.86085","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02818","scoring_system":"epss","scoring_elements":"0.86095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02818","scoring_system":"epss","scoring_elements":"0.86111","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02818","scoring_system":"epss","scoring_elements":"0.8613","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02818","scoring_system":"epss","scoring_elements":"0.86141","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02818","scoring_system":"epss","scoring_elements":"0.86156","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02818","scoring_system":"epss","scoring_elements":"0.86154","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092657","reference_id":"1092657","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092657"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-34","reference_id":"mfsa2014-34","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-34"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0448","reference_id":"RHSA-2014:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0449","reference_id":"RHSA-2014:0449","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0449"},{"reference_url":"https://usn.ubuntu.com/2185-1/","reference_id":"USN-2185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2185-1/"},{"reference_url":"https://usn.ubuntu.com/2189-1/","reference_id":"USN-2189-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2189-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1518"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5fwj-z7cg-rubb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56701?format=json","vulnerability_id":"VCID-5vvt-9wk5-qbej","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1510.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1510.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1510","reference_id":"","reference_type":"","scores":[{"value":"0.71088","scoring_system":"epss","scoring_elements":"0.98704","published_at":"2026-04-07T12:55:00Z"},{"value":"0.71088","scoring_system":"epss","scoring_elements":"0.98696","published_at":"2026-04-02T12:55:00Z"},{"value":"0.71088","scoring_system":"epss","scoring_elements":"0.987","published_at":"2026-04-04T12:55:00Z"},{"value":"0.71088","scoring_system":"epss","scoring_elements":"0.98708","published_at":"2026-04-13T12:55:00Z"},{"value":"0.71088","scoring_system":"epss","scoring_elements":"0.98705","published_at":"2026-04-09T12:55:00Z"},{"value":"0.71088","scoring_system":"epss","scoring_elements":"0.98707","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077490","reference_id":"1077490","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077490"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/34448.rb","reference_id":"CVE-2014-1511;OSVDB-104594;CVE-2014-1510;OSVDB-104593","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/34448.rb"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-29","reference_id":"mfsa2014-29","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0310","reference_id":"RHSA-2014:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0316","reference_id":"RHSA-2014:0316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0316"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"},{"reference_url":"https://usn.ubuntu.com/2151-1/","reference_id":"USN-2151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2151-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1510"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5vvt-9wk5-qbej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61206?format=json","vulnerability_id":"VCID-5wtn-t32h-xyg7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6672.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6672.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6672","reference_id":"","reference_type":"","scores":[{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76105","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76047","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.7608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.7606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76107","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76132","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76108","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6672"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039427","reference_id":"1039427","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672","reference_id":"CVE-2013-6672","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-112","reference_id":"mfsa2013-112","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-112"},{"reference_url":"https://usn.ubuntu.com/2052-1/","reference_id":"USN-2052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2052-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-6672"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5wtn-t32h-xyg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61218?format=json","vulnerability_id":"VCID-5xfz-9tyc-xfh3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1500.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1500.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1500","reference_id":"","reference_type":"","scores":[{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84602","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84525","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84539","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.8456","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84564","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84586","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84606","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1500"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077020","reference_id":"1077020","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077020"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1500","reference_id":"CVE-2014-1500","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1500"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-20","reference_id":"mfsa2014-20","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-20"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1500"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5xfz-9tyc-xfh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61297?format=json","vulnerability_id":"VCID-5z4v-hqea-eucx","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0821.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0821.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0821","reference_id":"","reference_type":"","scores":[{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80006","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.79955","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.79963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.79984","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.79973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80001","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.8001","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.8003","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80014","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0821"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195639","reference_id":"1195639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821","reference_id":"CVE-2015-0821","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-25","reference_id":"mfsa2015-25","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-25"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0821"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5z4v-hqea-eucx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61199?format=json","vulnerability_id":"VCID-62px-695g-57bk","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5613","reference_id":"","reference_type":"","scores":[{"value":"0.11056","scoring_system":"epss","scoring_elements":"0.93445","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11056","scoring_system":"epss","scoring_elements":"0.93411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11056","scoring_system":"epss","scoring_elements":"0.93418","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11056","scoring_system":"epss","scoring_elements":"0.93426","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11056","scoring_system":"epss","scoring_elements":"0.93427","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11056","scoring_system":"epss","scoring_elements":"0.93435","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11056","scoring_system":"epss","scoring_elements":"0.93438","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11056","scoring_system":"epss","scoring_elements":"0.93444","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5613"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039429","reference_id":"1039429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039429"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613","reference_id":"CVE-2013-5613","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-114","reference_id":"mfsa2013-114","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-114"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1812","reference_id":"RHSA-2013:1812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1823","reference_id":"RHSA-2013:1823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1823"},{"reference_url":"https://usn.ubuntu.com/2052-1/","reference_id":"USN-2052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2052-1/"},{"reference_url":"https://usn.ubuntu.com/2053-1/","reference_id":"USN-2053-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2053-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5613"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-62px-695g-57bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57038?format=json","vulnerability_id":"VCID-63hm-xmht-g3cp","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1592.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1592","reference_id":"","reference_type":"","scores":[{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82569","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82647","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82599","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82595","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82621","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82629","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1592"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088635","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"http://www.debian.org/security/2014/dsa-3090","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3090"},{"reference_url":"http://www.debian.org/security/2014/dsa-3092","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3092"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-87.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-87.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/71398","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71398"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169208","reference_id":"1169208","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169208"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1592","reference_id":"CVE-2014-1592","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1592"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-87","reference_id":"mfsa2014-87","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-87"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1919","reference_id":"RHSA-2014:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1924","reference_id":"RHSA-2014:1924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1924"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"},{"reference_url":"https://usn.ubuntu.com/2428-1/","reference_id":"USN-2428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1592"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-63hm-xmht-g3cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61298?format=json","vulnerability_id":"VCID-664r-gx3z-d7c6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0823.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0823","reference_id":"","reference_type":"","scores":[{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82331","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82261","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82294","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82288","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82315","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82322","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82342","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82336","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0823"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195636","reference_id":"1195636","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0823","reference_id":"CVE-2015-0823","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0823"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-23","reference_id":"mfsa2015-23","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-23"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0823"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-664r-gx3z-d7c6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61205?format=json","vulnerability_id":"VCID-69g6-8d1a-kubz","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6671","reference_id":"","reference_type":"","scores":[{"value":"0.10399","scoring_system":"epss","scoring_elements":"0.93214","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10399","scoring_system":"epss","scoring_elements":"0.93187","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10399","scoring_system":"epss","scoring_elements":"0.93196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10399","scoring_system":"epss","scoring_elements":"0.932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10399","scoring_system":"epss","scoring_elements":"0.93197","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10399","scoring_system":"epss","scoring_elements":"0.93206","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10399","scoring_system":"epss","scoring_elements":"0.9321","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10399","scoring_system":"epss","scoring_elements":"0.93215","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10399","scoring_system":"epss","scoring_elements":"0.93212","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6671"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039426","reference_id":"1039426","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671","reference_id":"CVE-2013-6671","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-111","reference_id":"mfsa2013-111","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1812","reference_id":"RHSA-2013:1812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1823","reference_id":"RHSA-2013:1823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1823"},{"reference_url":"https://usn.ubuntu.com/2052-1/","reference_id":"USN-2052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2052-1/"},{"reference_url":"https://usn.ubuntu.com/2053-1/","reference_id":"USN-2053-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2053-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-6671"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-69g6-8d1a-kubz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61269?format=json","vulnerability_id":"VCID-6gmw-bq5a-6qgg","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1588.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1588.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1588","reference_id":"","reference_type":"","scores":[{"value":"0.01676","scoring_system":"epss","scoring_elements":"0.82154","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01676","scoring_system":"epss","scoring_elements":"0.82086","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01676","scoring_system":"epss","scoring_elements":"0.82168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01676","scoring_system":"epss","scoring_elements":"0.82159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01676","scoring_system":"epss","scoring_elements":"0.82098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01676","scoring_system":"epss","scoring_elements":"0.82119","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01676","scoring_system":"epss","scoring_elements":"0.82115","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01676","scoring_system":"epss","scoring_elements":"0.82141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01676","scoring_system":"epss","scoring_elements":"0.82149","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1588"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1013001","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1013001"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1023158","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1023158"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1026037","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1026037"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1037830","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1037830"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1048517","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1048517"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1064835","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1064835"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073577","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073577"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1075546","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1075546"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1077687","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1077687"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1086842","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1086842"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1096026","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1096026"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-83.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-83.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169204","reference_id":"1169204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169204"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588","reference_id":"CVE-2014-1588","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1588","reference_id":"CVE-2014-1588","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1588"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-83","reference_id":"mfsa2014-83","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-83"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1588"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6gmw-bq5a-6qgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56706?format=json","vulnerability_id":"VCID-6hk9-8e47-zbhw","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1513.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1513","reference_id":"","reference_type":"","scores":[{"value":"0.01605","scoring_system":"epss","scoring_elements":"0.81728","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01605","scoring_system":"epss","scoring_elements":"0.81664","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01605","scoring_system":"epss","scoring_elements":"0.81675","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01605","scoring_system":"epss","scoring_elements":"0.81698","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01605","scoring_system":"epss","scoring_elements":"0.81695","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01605","scoring_system":"epss","scoring_elements":"0.81722","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01605","scoring_system":"epss","scoring_elements":"0.81727","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01605","scoring_system":"epss","scoring_elements":"0.81746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01605","scoring_system":"epss","scoring_elements":"0.81734","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077492","reference_id":"1077492","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077492"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-31","reference_id":"mfsa2014-31","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0310","reference_id":"RHSA-2014:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0316","reference_id":"RHSA-2014:0316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0316"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"},{"reference_url":"https://usn.ubuntu.com/2151-1/","reference_id":"USN-2151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2151-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1513"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6hk9-8e47-zbhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56914?format=json","vulnerability_id":"VCID-6rfs-5xxg-r3d3","summary":"security update","references":[{"reference_url":"http://linux.oracle.com/errata/ELSA-2014-0741.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2014-0741.html"},{"reference_url":"http://linux.oracle.com/errata/ELSA-2014-0742.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2014-0742.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0741.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0741.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0742.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0742.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1541.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1541.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1541","reference_id":"","reference_type":"","scores":[{"value":"0.01963","scoring_system":"epss","scoring_elements":"0.83514","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01963","scoring_system":"epss","scoring_elements":"0.83449","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01963","scoring_system":"epss","scoring_elements":"0.83523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01963","scoring_system":"epss","scoring_elements":"0.83517","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01963","scoring_system":"epss","scoring_elements":"0.83462","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01963","scoring_system":"epss","scoring_elements":"0.83477","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01963","scoring_system":"epss","scoring_elements":"0.83475","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01963","scoring_system":"epss","scoring_elements":"0.83499","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01963","scoring_system":"epss","scoring_elements":"0.83509","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1541"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1000185","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1000185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545"},{"reference_url":"http://secunia.com/advisories/58984","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/58984"},{"reference_url":"http://secunia.com/advisories/59052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59052"},{"reference_url":"http://secunia.com/advisories/59149","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59149"},{"reference_url":"http://secunia.com/advisories/59150","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59150"},{"reference_url":"http://secunia.com/advisories/59165","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59165"},{"reference_url":"http://secunia.com/advisories/59169","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59169"},{"reference_url":"http://secunia.com/advisories/59170","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59170"},{"reference_url":"http://secunia.com/advisories/59171","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59171"},{"reference_url":"http://secunia.com/advisories/59229","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59229"},{"reference_url":"http://secunia.com/advisories/59275","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59275"},{"reference_url":"http://secunia.com/advisories/59328","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59328"},{"reference_url":"http://secunia.com/advisories/59377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59377"},{"reference_url":"http://secunia.com/advisories/59387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59387"},{"reference_url":"http://secunia.com/advisories/59425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59425"},{"reference_url":"http://secunia.com/advisories/59486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59486"},{"reference_url":"http://secunia.com/advisories/59866","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59866"},{"reference_url":"http://www.debian.org/security/2014/dsa-2955","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2955"},{"reference_url":"http://www.debian.org/security/2014/dsa-2960","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2960"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-52.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-52.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/67979","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/67979"},{"reference_url":"http://www.securitytracker.com/id/1030386","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030386"},{"reference_url":"http://www.securitytracker.com/id/1030388","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030388"},{"reference_url":"http://www.ubuntu.com/usn/USN-2243-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2243-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2250-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2250-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107424","reference_id":"1107424","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107424"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1541","reference_id":"CVE-2014-1541","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1541"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-52","reference_id":"mfsa2014-52","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0741","reference_id":"RHSA-2014:0741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0742","reference_id":"RHSA-2014:0742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0742"},{"reference_url":"https://usn.ubuntu.com/2243-1/","reference_id":"USN-2243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2243-1/"},{"reference_url":"https://usn.ubuntu.com/2250-1/","reference_id":"USN-2250-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2250-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1541"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6rfs-5xxg-r3d3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61209?format=json","vulnerability_id":"VCID-6t5b-ykw1-rqdt","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1480.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1480.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1480","reference_id":"","reference_type":"","scores":[{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66818","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66781","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.6683","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66844","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66864","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.6685","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1480"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060941","reference_id":"1060941","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060941"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480","reference_id":"CVE-2014-1480","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-03","reference_id":"mfsa2014-03","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-03"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1480"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6t5b-ykw1-rqdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56815?format=json","vulnerability_id":"VCID-6ucm-3m3f-kfgs","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1531.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1531.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1531","reference_id":"","reference_type":"","scores":[{"value":"0.05086","scoring_system":"epss","scoring_elements":"0.89809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05086","scoring_system":"epss","scoring_elements":"0.89767","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05086","scoring_system":"epss","scoring_elements":"0.8977","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05086","scoring_system":"epss","scoring_elements":"0.89785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05086","scoring_system":"epss","scoring_elements":"0.89788","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05086","scoring_system":"epss","scoring_elements":"0.89805","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05086","scoring_system":"epss","scoring_elements":"0.89811","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05086","scoring_system":"epss","scoring_elements":"0.89818","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05086","scoring_system":"epss","scoring_elements":"0.89816","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092668","reference_id":"1092668","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092668"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-44","reference_id":"mfsa2014-44","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-44"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0448","reference_id":"RHSA-2014:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0449","reference_id":"RHSA-2014:0449","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0449"},{"reference_url":"https://usn.ubuntu.com/2185-1/","reference_id":"USN-2185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2185-1/"},{"reference_url":"https://usn.ubuntu.com/2189-1/","reference_id":"USN-2189-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2189-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1531"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ucm-3m3f-kfgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61248?format=json","vulnerability_id":"VCID-7hub-7qnq-63es","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1554.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1554.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1554","reference_id":"","reference_type":"","scores":[{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79486","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79418","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79456","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79464","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1554"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1004480","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1004480"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1016519","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1016519"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=990247","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=990247"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=995704","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=995704"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-67.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-67.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/69526","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69526"},{"reference_url":"http://www.securitytracker.com/id/1030793","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030793"},{"reference_url":"http://www.securitytracker.com/id/1030794","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030794"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135863","reference_id":"1135863","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135863"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554","reference_id":"CVE-2014-1554","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1554","reference_id":"CVE-2014-1554","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1554"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-67","reference_id":"mfsa2014-67","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-67"},{"reference_url":"https://usn.ubuntu.com/2329-1/","reference_id":"USN-2329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2329-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1554"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7hub-7qnq-63es"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61225?format=json","vulnerability_id":"VCID-7q2x-fv9r-ckdb","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1526.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1526.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1526","reference_id":"","reference_type":"","scores":[{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72001","published_at":"2026-04-13T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71954","published_at":"2026-04-01T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71962","published_at":"2026-04-02T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71981","published_at":"2026-04-04T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72008","published_at":"2026-04-09T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72032","published_at":"2026-04-11T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72016","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1526"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1095074","reference_id":"1095074","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1095074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1526","reference_id":"CVE-2014-1526","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1526"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-47","reference_id":"mfsa2014-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-47"},{"reference_url":"https://usn.ubuntu.com/2185-1/","reference_id":"USN-2185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2185-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1526"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7q2x-fv9r-ckdb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61228?format=json","vulnerability_id":"VCID-7sgt-5xdn-tkey","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1537.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1537.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1537","reference_id":"","reference_type":"","scores":[{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87292","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87238","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87302","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87296","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87248","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87264","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87281","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87289","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1537"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=999274","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=999274"},{"reference_url":"http://secunia.com/advisories/59052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59052"},{"reference_url":"http://secunia.com/advisories/59171","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59171"},{"reference_url":"http://secunia.com/advisories/59229","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59229"},{"reference_url":"http://secunia.com/advisories/59377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59377"},{"reference_url":"http://secunia.com/advisories/59387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59387"},{"reference_url":"http://secunia.com/advisories/59425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59425"},{"reference_url":"http://secunia.com/advisories/59486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59486"},{"reference_url":"http://secunia.com/advisories/59866","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59866"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-49.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-49.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/67971","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/67971"},{"reference_url":"http://www.securitytracker.com/id/1030386","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030386"},{"reference_url":"http://www.securitytracker.com/id/1030388","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030388"},{"reference_url":"http://www.ubuntu.com/usn/USN-2243-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2243-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107419","reference_id":"1107419","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107419"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537","reference_id":"CVE-2014-1537","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1537","reference_id":"CVE-2014-1537","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1537"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-49","reference_id":"mfsa2014-49","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-49"},{"reference_url":"https://usn.ubuntu.com/2243-1/","reference_id":"USN-2243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2243-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1537"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7sgt-5xdn-tkey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56698?format=json","vulnerability_id":"VCID-81hn-3y96-77db","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1508.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1508","reference_id":"","reference_type":"","scores":[{"value":"0.00986","scoring_system":"epss","scoring_elements":"0.76827","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00986","scoring_system":"epss","scoring_elements":"0.7677","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00986","scoring_system":"epss","scoring_elements":"0.76774","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00986","scoring_system":"epss","scoring_elements":"0.76802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00986","scoring_system":"epss","scoring_elements":"0.76783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00986","scoring_system":"epss","scoring_elements":"0.76814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00986","scoring_system":"epss","scoring_elements":"0.76825","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00986","scoring_system":"epss","scoring_elements":"0.76853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00986","scoring_system":"epss","scoring_elements":"0.76834","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077025","reference_id":"1077025","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077025"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-26","reference_id":"mfsa2014-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0310","reference_id":"RHSA-2014:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0316","reference_id":"RHSA-2014:0316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0316"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"},{"reference_url":"https://usn.ubuntu.com/2151-1/","reference_id":"USN-2151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2151-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1508"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-81hn-3y96-77db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34044?format=json","vulnerability_id":"VCID-8j3v-g9xv-gud5","summary":"Multiple vulnerabilities have been discovered in Mozilla Network\n    Security Service, the worst of which could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1741.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1741.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1741","reference_id":"","reference_type":"","scores":[{"value":"0.02604","scoring_system":"epss","scoring_elements":"0.85622","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02604","scoring_system":"epss","scoring_elements":"0.8555","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02604","scoring_system":"epss","scoring_elements":"0.85563","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02604","scoring_system":"epss","scoring_elements":"0.8558","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02604","scoring_system":"epss","scoring_elements":"0.85585","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02604","scoring_system":"epss","scoring_elements":"0.85605","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02604","scoring_system":"epss","scoring_elements":"0.85616","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02604","scoring_system":"epss","scoring_elements":"0.8563","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02604","scoring_system":"epss","scoring_elements":"0.85626","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1031458","reference_id":"1031458","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1031458"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105","reference_id":"735105","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105"},{"reference_url":"https://security.gentoo.org/glsa/201406-19","reference_id":"GLSA-201406-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-19"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-103","reference_id":"mfsa2013-103","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1791","reference_id":"RHSA-2013:1791","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1829","reference_id":"RHSA-2013:1829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1829"},{"reference_url":"https://usn.ubuntu.com/2030-1/","reference_id":"USN-2030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2030-1/"},{"reference_url":"https://usn.ubuntu.com/2031-1/","reference_id":"USN-2031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2031-1/"},{"reference_url":"https://usn.ubuntu.com/2032-1/","reference_id":"USN-2032-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2032-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-1741"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8j3v-g9xv-gud5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57035?format=json","vulnerability_id":"VCID-8s1b-yh8y-cbdk","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1587.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1587.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1587","reference_id":"","reference_type":"","scores":[{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81958","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.8189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81974","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81963","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81901","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81924","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.8192","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81947","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81954","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1587"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1042567","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1042567"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1072847","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1072847"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1079729","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1079729"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080312","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080312"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1089207","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1089207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"http://www.debian.org/security/2014/dsa-3090","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3090"},{"reference_url":"http://www.debian.org/security/2014/dsa-3092","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3092"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-83.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-83.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/71391","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71391"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169201","reference_id":"1169201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169201"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1587","reference_id":"CVE-2014-1587","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1587"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-83","reference_id":"mfsa2014-83","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-83"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1919","reference_id":"RHSA-2014:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1924","reference_id":"RHSA-2014:1924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1924"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"},{"reference_url":"https://usn.ubuntu.com/2428-1/","reference_id":"USN-2428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1587"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8s1b-yh8y-cbdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34049?format=json","vulnerability_id":"VCID-97rg-h7t5-1fhs","summary":"Multiple vulnerabilities have been discovered in Mozilla Network\n    Security Service, the worst of which could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5607.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5607.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5607","reference_id":"","reference_type":"","scores":[{"value":"0.01591","scoring_system":"epss","scoring_elements":"0.81653","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01591","scoring_system":"epss","scoring_elements":"0.8159","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01591","scoring_system":"epss","scoring_elements":"0.81601","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01591","scoring_system":"epss","scoring_elements":"0.81622","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01591","scoring_system":"epss","scoring_elements":"0.8162","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01591","scoring_system":"epss","scoring_elements":"0.81647","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01591","scoring_system":"epss","scoring_elements":"0.81652","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01591","scoring_system":"epss","scoring_elements":"0.81673","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01591","scoring_system":"epss","scoring_elements":"0.81659","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1031461","reference_id":"1031461","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1031461"},{"reference_url":"https://security.gentoo.org/glsa/201406-19","reference_id":"GLSA-201406-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-19"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-103","reference_id":"mfsa2013-103","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1791","reference_id":"RHSA-2013:1791","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1829","reference_id":"RHSA-2013:1829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1829"},{"reference_url":"https://usn.ubuntu.com/2031-1/","reference_id":"USN-2031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2031-1/"},{"reference_url":"https://usn.ubuntu.com/2032-1/","reference_id":"USN-2032-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2032-1/"},{"reference_url":"https://usn.ubuntu.com/2087-1/","reference_id":"USN-2087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2087-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5607"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-97rg-h7t5-1fhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58189?format=json","vulnerability_id":"VCID-9bat-kqxd-gkg2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8634.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8634.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8634","reference_id":"","reference_type":"","scores":[{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82545","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82474","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82502","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82529","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82536","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82555","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.8255","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180962","reference_id":"1180962","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180962"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-01","reference_id":"mfsa2015-01","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0046","reference_id":"RHSA-2015:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0047","reference_id":"RHSA-2015:0047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0047"},{"reference_url":"https://usn.ubuntu.com/2458-1/","reference_id":"USN-2458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2458-1/"},{"reference_url":"https://usn.ubuntu.com/2460-1/","reference_id":"USN-2460-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2460-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-8634"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9bat-kqxd-gkg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61307?format=json","vulnerability_id":"VCID-9e6r-hnyd-6ufr","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0834","reference_id":"","reference_type":"","scores":[{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66573","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66501","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.6654","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66566","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66586","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66606","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0834"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195616","reference_id":"1195616","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834","reference_id":"CVE-2015-0834","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-15","reference_id":"mfsa2015-15","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-15"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0834"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9e6r-hnyd-6ufr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61230?format=json","vulnerability_id":"VCID-9kcz-e3yx-ckgf","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1540.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1540.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1540","reference_id":"","reference_type":"","scores":[{"value":"0.01009","scoring_system":"epss","scoring_elements":"0.77085","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01009","scoring_system":"epss","scoring_elements":"0.77024","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01009","scoring_system":"epss","scoring_elements":"0.77109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01009","scoring_system":"epss","scoring_elements":"0.77089","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01009","scoring_system":"epss","scoring_elements":"0.77029","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01009","scoring_system":"epss","scoring_elements":"0.77058","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01009","scoring_system":"epss","scoring_elements":"0.77039","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01009","scoring_system":"epss","scoring_elements":"0.77071","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01009","scoring_system":"epss","scoring_elements":"0.77081","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1540"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=978862","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=978862"},{"reference_url":"http://secunia.com/advisories/59052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59052"},{"reference_url":"http://secunia.com/advisories/59171","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59171"},{"reference_url":"http://secunia.com/advisories/59387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59387"},{"reference_url":"http://secunia.com/advisories/59486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59486"},{"reference_url":"http://secunia.com/advisories/59866","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59866"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-51.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-51.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/67978","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/67978"},{"reference_url":"http://www.securitytracker.com/id/1030388","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030388"},{"reference_url":"http://www.ubuntu.com/usn/USN-2243-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2243-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107423","reference_id":"1107423","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107423"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1540","reference_id":"CVE-2014-1540","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1540"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1540","reference_id":"CVE-2014-1540","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1540"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-51","reference_id":"mfsa2014-51","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-51"},{"reference_url":"https://usn.ubuntu.com/2243-1/","reference_id":"USN-2243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2243-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1540"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9kcz-e3yx-ckgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56811?format=json","vulnerability_id":"VCID-adnk-um4v-q7dm","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1529.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1529.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1529","reference_id":"","reference_type":"","scores":[{"value":"0.01321","scoring_system":"epss","scoring_elements":"0.79874","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01321","scoring_system":"epss","scoring_elements":"0.79825","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01321","scoring_system":"epss","scoring_elements":"0.79833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01321","scoring_system":"epss","scoring_elements":"0.79854","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01321","scoring_system":"epss","scoring_elements":"0.79842","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01321","scoring_system":"epss","scoring_elements":"0.7987","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01321","scoring_system":"epss","scoring_elements":"0.79878","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01321","scoring_system":"epss","scoring_elements":"0.79899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01321","scoring_system":"epss","scoring_elements":"0.79882","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092664","reference_id":"1092664","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092664"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-42","reference_id":"mfsa2014-42","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-42"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0448","reference_id":"RHSA-2014:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0449","reference_id":"RHSA-2014:0449","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0449"},{"reference_url":"https://usn.ubuntu.com/2185-1/","reference_id":"USN-2185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2185-1/"},{"reference_url":"https://usn.ubuntu.com/2189-1/","reference_id":"USN-2189-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2189-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1529"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-adnk-um4v-q7dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61244?format=json","vulnerability_id":"VCID-apyq-fcne-wqfw","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1551","reference_id":"","reference_type":"","scores":[{"value":"0.05409","scoring_system":"epss","scoring_elements":"0.9014","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05409","scoring_system":"epss","scoring_elements":"0.90097","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05409","scoring_system":"epss","scoring_elements":"0.90146","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05409","scoring_system":"epss","scoring_elements":"0.90145","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05409","scoring_system":"epss","scoring_elements":"0.90099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05409","scoring_system":"epss","scoring_elements":"0.90111","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05409","scoring_system":"epss","scoring_elements":"0.90116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05409","scoring_system":"epss","scoring_elements":"0.90131","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05409","scoring_system":"epss","scoring_elements":"0.90137","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1551"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1018234","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1018234"},{"reference_url":"http://secunia.com/advisories/59760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59760"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-59.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-59.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securitytracker.com/id/1030619","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030619"},{"reference_url":"http://www.securitytracker.com/id/1030620","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1551","reference_id":"CVE-2014-1551","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1551"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1551","reference_id":"CVE-2014-1551","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1551"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-59","reference_id":"mfsa2014-59","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-59"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1551"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-apyq-fcne-wqfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61245?format=json","vulnerability_id":"VCID-at2x-qdn8-4bgy","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1552.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1552","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42141","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42093","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42204","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42167","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42153","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4218","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4212","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4217","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42182","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1552"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=985135","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=985135"},{"reference_url":"http://secunia.com/advisories/59760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59760"},{"reference_url":"http://secunia.com/advisories/60628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60628"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-66.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-66.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securitytracker.com/id/1030619","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030619"},{"reference_url":"http://www.securitytracker.com/id/1030620","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121481","reference_id":"1121481","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121481"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1552","reference_id":"CVE-2014-1552","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1552"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1552","reference_id":"CVE-2014-1552","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1552"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-66","reference_id":"mfsa2014-66","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-66"},{"reference_url":"https://usn.ubuntu.com/2295-1/","reference_id":"USN-2295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2295-1/"},{"reference_url":"https://usn.ubuntu.com/2296-1/","reference_id":"USN-2296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2296-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1552"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-at2x-qdn8-4bgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61203?format=json","vulnerability_id":"VCID-b2k8-kjmq-1kh4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5618","reference_id":"","reference_type":"","scores":[{"value":"0.10378","scoring_system":"epss","scoring_elements":"0.93207","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10378","scoring_system":"epss","scoring_elements":"0.93179","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10378","scoring_system":"epss","scoring_elements":"0.93189","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10378","scoring_system":"epss","scoring_elements":"0.93193","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10378","scoring_system":"epss","scoring_elements":"0.93191","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10378","scoring_system":"epss","scoring_elements":"0.93199","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10378","scoring_system":"epss","scoring_elements":"0.93204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10378","scoring_system":"epss","scoring_elements":"0.93208","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10378","scoring_system":"epss","scoring_elements":"0.93206","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5618"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039423","reference_id":"1039423","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618","reference_id":"CVE-2013-5618","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-109","reference_id":"mfsa2013-109","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1812","reference_id":"RHSA-2013:1812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1823","reference_id":"RHSA-2013:1823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1823"},{"reference_url":"https://usn.ubuntu.com/2052-1/","reference_id":"USN-2052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2052-1/"},{"reference_url":"https://usn.ubuntu.com/2053-1/","reference_id":"USN-2053-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2053-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5618"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b2k8-kjmq-1kh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56669?format=json","vulnerability_id":"VCID-b3mt-3nfn-suc1","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1490.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1490.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1490","reference_id":"","reference_type":"","scores":[{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.81519","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.81448","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.81459","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.81481","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.81479","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.81506","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.81512","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.81532","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060953","reference_id":"1060953","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060953"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-12","reference_id":"mfsa2014-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0917","reference_id":"RHSA-2014:0917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1246","reference_id":"RHSA-2014:1246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1246"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"},{"reference_url":"https://usn.ubuntu.com/2119-1/","reference_id":"USN-2119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2119-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1490"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b3mt-3nfn-suc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61293?format=json","vulnerability_id":"VCID-b3n2-ujct-nbcy","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8642.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8642.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8642","reference_id":"","reference_type":"","scores":[{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71065","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71015","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71017","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.7106","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71074","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71098","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71082","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8642"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180974","reference_id":"1180974","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8642","reference_id":"CVE-2014-8642","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8642"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-08","reference_id":"mfsa2015-08","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-08"},{"reference_url":"https://usn.ubuntu.com/2458-1/","reference_id":"USN-2458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2458-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-8642"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b3n2-ujct-nbcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61299?format=json","vulnerability_id":"VCID-ba82-rgap-z7ck","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0824.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0824.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0824","reference_id":"","reference_type":"","scores":[{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81562","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81573","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81594","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81592","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.8162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81645","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0824"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195633","reference_id":"1195633","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824","reference_id":"CVE-2015-0824","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-22","reference_id":"mfsa2015-22","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-22"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0824"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ba82-rgap-z7ck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61232?format=json","vulnerability_id":"VCID-bqyr-zs78-13en","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1543.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1543.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1543","reference_id":"","reference_type":"","scores":[{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87425","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87371","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87433","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87429","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.8738","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87396","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87395","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87414","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87421","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1543"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011859","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011859"},{"reference_url":"http://secunia.com/advisories/59171","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59171"},{"reference_url":"http://secunia.com/advisories/59387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59387"},{"reference_url":"http://secunia.com/advisories/59486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59486"},{"reference_url":"http://secunia.com/advisories/59866","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59866"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-54.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-54.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/67969","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/67969"},{"reference_url":"http://www.securitytracker.com/id/1030388","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030388"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1108682","reference_id":"1108682","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1108682"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1543","reference_id":"CVE-2014-1543","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1543"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1543","reference_id":"CVE-2014-1543","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1543"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-54","reference_id":"mfsa2014-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-54"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1543"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bqyr-zs78-13en"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56971?format=json","vulnerability_id":"VCID-bu79-vmrf-v7cy","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1576.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1576.json"},{"reference_url":"https://advisories.mageia.org/MGASA-2014-0421.html","reference_id":"","reference_type":"","scores":[],"url":"https://advisories.mageia.org/MGASA-2014-0421.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1576","reference_id":"","reference_type":"","scores":[{"value":"0.04667","scoring_system":"epss","scoring_elements":"0.89322","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04667","scoring_system":"epss","scoring_elements":"0.89276","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04667","scoring_system":"epss","scoring_elements":"0.89328","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04667","scoring_system":"epss","scoring_elements":"0.89326","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04667","scoring_system":"epss","scoring_elements":"0.89282","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04667","scoring_system":"epss","scoring_elements":"0.89295","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04667","scoring_system":"epss","scoring_elements":"0.89298","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04667","scoring_system":"epss","scoring_elements":"0.89315","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04667","scoring_system":"epss","scoring_elements":"0.89319","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1576"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1041512","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1041512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586"},{"reference_url":"http://secunia.com/advisories/61387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61387"},{"reference_url":"http://secunia.com/advisories/61854","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61854"},{"reference_url":"http://secunia.com/advisories/62021","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62021"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.debian.org/security/2014/dsa-3050","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3050"},{"reference_url":"http://www.debian.org/security/2014/dsa-3061","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3061"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-75.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-75.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/70430","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70430"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.securitytracker.com/id/1031030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031030"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2373-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2373-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152358","reference_id":"1152358","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152358"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1576","reference_id":"CVE-2014-1576","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1576"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-75","reference_id":"mfsa2014-75","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-75"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1635","reference_id":"RHSA-2014:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1635"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"},{"reference_url":"https://usn.ubuntu.com/2373-1/","reference_id":"USN-2373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1576"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bu79-vmrf-v7cy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61193?format=json","vulnerability_id":"VCID-cdpz-9xmq-nygt","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5596.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5596.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5596","reference_id":"","reference_type":"","scores":[{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82674","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82608","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82634","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.8266","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82685","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82679","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5596"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023840","reference_id":"1023840","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5596","reference_id":"CVE-2013-5596","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5596"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-97","reference_id":"mfsa2013-97","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-97"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"},{"reference_url":"https://usn.ubuntu.com/2010-1/","reference_id":"USN-2010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5596"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cdpz-9xmq-nygt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56970?format=json","vulnerability_id":"VCID-cjda-dm64-kqg2","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1574.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1574.json"},{"reference_url":"https://advisories.mageia.org/MGASA-2014-0421.html","reference_id":"","reference_type":"","scores":[],"url":"https://advisories.mageia.org/MGASA-2014-0421.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1574","reference_id":"","reference_type":"","scores":[{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81964","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.8198","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81908","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.8193","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81927","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81961","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1574"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011354","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011354"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1061214","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1061214"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1061600","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1061600"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1064346","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1064346"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1072044","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1072044"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1072174","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1072174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586"},{"reference_url":"http://secunia.com/advisories/61387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61387"},{"reference_url":"http://secunia.com/advisories/61854","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61854"},{"reference_url":"http://secunia.com/advisories/62021","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62021"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.debian.org/security/2014/dsa-3050","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3050"},{"reference_url":"http://www.debian.org/security/2014/dsa-3061","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3061"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-74.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-74.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/70436","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70436"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.securitytracker.com/id/1031030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031030"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2373-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2373-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152356","reference_id":"1152356","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152356"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1574","reference_id":"CVE-2014-1574","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1574"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-74","reference_id":"mfsa2014-74","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-74"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1635","reference_id":"RHSA-2014:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1647","reference_id":"RHSA-2014:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1647"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"},{"reference_url":"https://usn.ubuntu.com/2373-1/","reference_id":"USN-2373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1574"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cjda-dm64-kqg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61207?format=json","vulnerability_id":"VCID-cnc6-yyk1-zqc3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6673.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6673.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6673","reference_id":"","reference_type":"","scores":[{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67776","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.677","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67734","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67735","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67801","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67824","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.6781","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6673"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039428","reference_id":"1039428","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673","reference_id":"CVE-2013-6673","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-113","reference_id":"mfsa2013-113","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-113"},{"reference_url":"https://usn.ubuntu.com/2052-1/","reference_id":"USN-2052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2052-1/"},{"reference_url":"https://usn.ubuntu.com/2053-1/","reference_id":"USN-2053-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2053-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-6673"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cnc6-yyk1-zqc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61295?format=json","vulnerability_id":"VCID-crfx-bba1-97b6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0819.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0819.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0819","reference_id":"","reference_type":"","scores":[{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75862","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75804","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75808","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.7584","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75819","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75868","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195640","reference_id":"1195640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0819","reference_id":"CVE-2015-0819","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0819"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-26","reference_id":"mfsa2015-26","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-26"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0819"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-crfx-bba1-97b6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56697?format=json","vulnerability_id":"VCID-ct3d-sqe7-vyhh","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1505.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1505.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1505","reference_id":"","reference_type":"","scores":[{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68834","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68768","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68787","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68807","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68785","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68836","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68878","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68863","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077029","reference_id":"1077029","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077029"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-28","reference_id":"mfsa2014-28","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-28"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0310","reference_id":"RHSA-2014:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0316","reference_id":"RHSA-2014:0316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0316"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"},{"reference_url":"https://usn.ubuntu.com/2151-1/","reference_id":"USN-2151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2151-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1505"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ct3d-sqe7-vyhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61202?format=json","vulnerability_id":"VCID-db94-kcvc-zybp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5616","reference_id":"","reference_type":"","scores":[{"value":"0.02874","scoring_system":"epss","scoring_elements":"0.86278","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02874","scoring_system":"epss","scoring_elements":"0.86212","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02874","scoring_system":"epss","scoring_elements":"0.86221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02874","scoring_system":"epss","scoring_elements":"0.86239","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02874","scoring_system":"epss","scoring_elements":"0.8624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02874","scoring_system":"epss","scoring_elements":"0.86259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02874","scoring_system":"epss","scoring_elements":"0.8627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02874","scoring_system":"epss","scoring_elements":"0.86284","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02874","scoring_system":"epss","scoring_elements":"0.86282","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5616"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039422","reference_id":"1039422","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039422"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616","reference_id":"CVE-2013-5616","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-108","reference_id":"mfsa2013-108","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1812","reference_id":"RHSA-2013:1812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1823","reference_id":"RHSA-2013:1823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1823"},{"reference_url":"https://usn.ubuntu.com/2052-1/","reference_id":"USN-2052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2052-1/"},{"reference_url":"https://usn.ubuntu.com/2053-1/","reference_id":"USN-2053-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2053-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5616"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-db94-kcvc-zybp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56699?format=json","vulnerability_id":"VCID-dhhr-be6c-73a6","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1509.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1509.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1509","reference_id":"","reference_type":"","scores":[{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.74223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.74174","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.74179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.74207","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.74212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.74227","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.74248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.7423","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077028","reference_id":"1077028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077028"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-27","reference_id":"mfsa2014-27","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0310","reference_id":"RHSA-2014:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0316","reference_id":"RHSA-2014:0316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0316"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"},{"reference_url":"https://usn.ubuntu.com/2151-1/","reference_id":"USN-2151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2151-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1509"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dhhr-be6c-73a6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61300?format=json","vulnerability_id":"VCID-dm6s-ammq-33dp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0825","reference_id":"","reference_type":"","scores":[{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71196","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71146","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71156","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71191","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71226","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71212","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0825"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195631","reference_id":"1195631","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825","reference_id":"CVE-2015-0825","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-21","reference_id":"mfsa2015-21","reference_type":"","scores":[{"value":"medium","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-21"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0825"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dm6s-ammq-33dp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61257?format=json","vulnerability_id":"VCID-dn78-xcpj-97af","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1561.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1561.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1561","reference_id":"","reference_type":"","scores":[{"value":"0.00752","scoring_system":"epss","scoring_elements":"0.73177","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00752","scoring_system":"epss","scoring_elements":"0.73123","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00752","scoring_system":"epss","scoring_elements":"0.73203","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00752","scoring_system":"epss","scoring_elements":"0.73184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00752","scoring_system":"epss","scoring_elements":"0.73134","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00752","scoring_system":"epss","scoring_elements":"0.73155","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00752","scoring_system":"epss","scoring_elements":"0.73129","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00752","scoring_system":"epss","scoring_elements":"0.73165","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00752","scoring_system":"epss","scoring_elements":"0.73179","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1561"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1000514","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1000514"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=910375","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=910375"},{"reference_url":"http://secunia.com/advisories/59760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59760"},{"reference_url":"http://secunia.com/advisories/60628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60628"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-60.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-60.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securitytracker.com/id/1030619","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030619"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121473","reference_id":"1121473","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121473"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1561","reference_id":"CVE-2014-1561","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1561"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1561","reference_id":"CVE-2014-1561","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1561"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-60","reference_id":"mfsa2014-60","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-60"},{"reference_url":"https://usn.ubuntu.com/2295-1/","reference_id":"USN-2295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2295-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1561"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dn78-xcpj-97af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34046?format=json","vulnerability_id":"VCID-dtrc-mwu9-2bdf","summary":"Multiple vulnerabilities have been discovered in Mozilla Network\n    Security Service, the worst of which could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5605.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5605.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5605","reference_id":"","reference_type":"","scores":[{"value":"0.0279","scoring_system":"epss","scoring_elements":"0.86084","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0279","scoring_system":"epss","scoring_elements":"0.8602","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0279","scoring_system":"epss","scoring_elements":"0.86031","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0279","scoring_system":"epss","scoring_elements":"0.86048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0279","scoring_system":"epss","scoring_elements":"0.86067","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0279","scoring_system":"epss","scoring_elements":"0.86077","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0279","scoring_system":"epss","scoring_elements":"0.86092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0279","scoring_system":"epss","scoring_elements":"0.86089","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5605"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1030807","reference_id":"1030807","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1030807"},{"reference_url":"https://security.gentoo.org/glsa/201406-19","reference_id":"GLSA-201406-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-19"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-103","reference_id":"mfsa2013-103","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1791","reference_id":"RHSA-2013:1791","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1829","reference_id":"RHSA-2013:1829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1840","reference_id":"RHSA-2013:1840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1841","reference_id":"RHSA-2013:1841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0041","reference_id":"RHSA-2014:0041","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0041"},{"reference_url":"https://usn.ubuntu.com/2030-1/","reference_id":"USN-2030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2030-1/"},{"reference_url":"https://usn.ubuntu.com/2031-1/","reference_id":"USN-2031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2031-1/"},{"reference_url":"https://usn.ubuntu.com/2032-1/","reference_id":"USN-2032-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2032-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5605"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dtrc-mwu9-2bdf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56664?format=json","vulnerability_id":"VCID-dzfq-91b8-kqcd","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1482.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1482.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1482","reference_id":"","reference_type":"","scores":[{"value":"0.02741","scoring_system":"epss","scoring_elements":"0.85983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02741","scoring_system":"epss","scoring_elements":"0.85917","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02741","scoring_system":"epss","scoring_elements":"0.85929","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02741","scoring_system":"epss","scoring_elements":"0.85945","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02741","scoring_system":"epss","scoring_elements":"0.85947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02741","scoring_system":"epss","scoring_elements":"0.85966","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02741","scoring_system":"epss","scoring_elements":"0.85976","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02741","scoring_system":"epss","scoring_elements":"0.8599","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02741","scoring_system":"epss","scoring_elements":"0.85988","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060942","reference_id":"1060942","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060942"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-04","reference_id":"mfsa2014-04","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0132","reference_id":"RHSA-2014:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0133","reference_id":"RHSA-2014:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0133"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"},{"reference_url":"https://usn.ubuntu.com/2119-1/","reference_id":"USN-2119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2119-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1482"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dzfq-91b8-kqcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55674?format=json","vulnerability_id":"VCID-dzyy-5mb7-kugn","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5590.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5590.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5590","reference_id":"","reference_type":"","scores":[{"value":"0.02058","scoring_system":"epss","scoring_elements":"0.83895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02058","scoring_system":"epss","scoring_elements":"0.83828","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02058","scoring_system":"epss","scoring_elements":"0.83841","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02058","scoring_system":"epss","scoring_elements":"0.83856","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02058","scoring_system":"epss","scoring_elements":"0.83859","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02058","scoring_system":"epss","scoring_elements":"0.83882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02058","scoring_system":"epss","scoring_elements":"0.83888","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02058","scoring_system":"epss","scoring_elements":"0.83905","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02058","scoring_system":"epss","scoring_elements":"0.83899","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023835","reference_id":"1023835","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023835"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-93","reference_id":"mfsa2013-93","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-93"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1476","reference_id":"RHSA-2013:1476","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1480","reference_id":"RHSA-2013:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1480"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"},{"reference_url":"https://usn.ubuntu.com/2010-1/","reference_id":"USN-2010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5590"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dzyy-5mb7-kugn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57041?format=json","vulnerability_id":"VCID-e1ef-b4f7-7yd8","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1594.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1594","reference_id":"","reference_type":"","scores":[{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82183","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82259","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82213","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82239","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82247","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1594"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1074280","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1074280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"http://www.debian.org/security/2014/dsa-3090","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3090"},{"reference_url":"http://www.debian.org/security/2014/dsa-3092","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3092"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-89.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-89.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/71396","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71396"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169210","reference_id":"1169210","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169210"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1594","reference_id":"CVE-2014-1594","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1594"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-89","reference_id":"mfsa2014-89","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-89"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1919","reference_id":"RHSA-2014:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1924","reference_id":"RHSA-2014:1924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1924"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"},{"reference_url":"https://usn.ubuntu.com/2428-1/","reference_id":"USN-2428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1594"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e1ef-b4f7-7yd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59587?format=json","vulnerability_id":"VCID-ep8z-jvbx-rqcj","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0836","reference_id":"","reference_type":"","scores":[{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81065","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81002","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81035","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81034","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81062","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81068","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81086","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81072","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195605","reference_id":"1195605","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195605"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-11","reference_id":"mfsa2015-11","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0265","reference_id":"RHSA-2015:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0266","reference_id":"RHSA-2015:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0629","reference_id":"RHSA-2015:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0642","reference_id":"RHSA-2015:0642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0642"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"},{"reference_url":"https://usn.ubuntu.com/2506-1/","reference_id":"USN-2506-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2506-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0836"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ep8z-jvbx-rqcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58191?format=json","vulnerability_id":"VCID-f1nz-g5h1-m7dm","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8638.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8638","reference_id":"","reference_type":"","scores":[{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65798","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65713","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65763","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65758","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65811","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65822","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65828","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180966","reference_id":"1180966","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180966"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-03","reference_id":"mfsa2015-03","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0046","reference_id":"RHSA-2015:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0047","reference_id":"RHSA-2015:0047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0047"},{"reference_url":"https://usn.ubuntu.com/2458-1/","reference_id":"USN-2458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2458-1/"},{"reference_url":"https://usn.ubuntu.com/2460-1/","reference_id":"USN-2460-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2460-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-8638"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f1nz-g5h1-m7dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61270?format=json","vulnerability_id":"VCID-f7my-dd2c-mfex","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1589.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1589.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1589","reference_id":"","reference_type":"","scores":[{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53741","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.5366","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53774","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.5368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53707","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53728","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53726","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1589"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1043787","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1043787"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-84.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-84.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169205","reference_id":"1169205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169205"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589","reference_id":"CVE-2014-1589","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1589","reference_id":"CVE-2014-1589","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1589"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-84","reference_id":"mfsa2014-84","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-84"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1589"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f7my-dd2c-mfex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56912?format=json","vulnerability_id":"VCID-faad-47h1-nbh3","summary":"security update","references":[{"reference_url":"http://linux.oracle.com/errata/ELSA-2014-0741.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2014-0741.html"},{"reference_url":"http://linux.oracle.com/errata/ELSA-2014-0742.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2014-0742.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0741.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0741.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0742.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0742.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1538.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1538.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1538","reference_id":"","reference_type":"","scores":[{"value":"0.02681","scoring_system":"epss","scoring_elements":"0.85842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02681","scoring_system":"epss","scoring_elements":"0.85769","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02681","scoring_system":"epss","scoring_elements":"0.8585","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02681","scoring_system":"epss","scoring_elements":"0.85846","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02681","scoring_system":"epss","scoring_elements":"0.85782","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02681","scoring_system":"epss","scoring_elements":"0.858","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02681","scoring_system":"epss","scoring_elements":"0.85806","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02681","scoring_system":"epss","scoring_elements":"0.85824","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02681","scoring_system":"epss","scoring_elements":"0.85835","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1538"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1005584","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1005584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545"},{"reference_url":"http://secunia.com/advisories/58984","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/58984"},{"reference_url":"http://secunia.com/advisories/59052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59052"},{"reference_url":"http://secunia.com/advisories/59149","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59149"},{"reference_url":"http://secunia.com/advisories/59150","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59150"},{"reference_url":"http://secunia.com/advisories/59165","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59165"},{"reference_url":"http://secunia.com/advisories/59169","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59169"},{"reference_url":"http://secunia.com/advisories/59170","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59170"},{"reference_url":"http://secunia.com/advisories/59171","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59171"},{"reference_url":"http://secunia.com/advisories/59229","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59229"},{"reference_url":"http://secunia.com/advisories/59275","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59275"},{"reference_url":"http://secunia.com/advisories/59328","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59328"},{"reference_url":"http://secunia.com/advisories/59377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59377"},{"reference_url":"http://secunia.com/advisories/59387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59387"},{"reference_url":"http://secunia.com/advisories/59425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59425"},{"reference_url":"http://secunia.com/advisories/59486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59486"},{"reference_url":"http://secunia.com/advisories/59866","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59866"},{"reference_url":"http://www.debian.org/security/2014/dsa-2955","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2955"},{"reference_url":"http://www.debian.org/security/2014/dsa-2960","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2960"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-49.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-49.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/67976","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/67976"},{"reference_url":"http://www.securitytracker.com/id/1030386","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030386"},{"reference_url":"http://www.securitytracker.com/id/1030388","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030388"},{"reference_url":"http://www.ubuntu.com/usn/USN-2243-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2243-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2250-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2250-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107421","reference_id":"1107421","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107421"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1538","reference_id":"CVE-2014-1538","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1538"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-49","reference_id":"mfsa2014-49","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-49"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0741","reference_id":"RHSA-2014:0741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0742","reference_id":"RHSA-2014:0742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0742"},{"reference_url":"https://usn.ubuntu.com/2243-1/","reference_id":"USN-2243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2243-1/"},{"reference_url":"https://usn.ubuntu.com/2250-1/","reference_id":"USN-2250-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2250-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1538"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-faad-47h1-nbh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61265?format=json","vulnerability_id":"VCID-fwk8-2rdv-cycf","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1575.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1575.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1575","reference_id":"","reference_type":"","scores":[{"value":"0.0199","scoring_system":"epss","scoring_elements":"0.83613","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0199","scoring_system":"epss","scoring_elements":"0.83547","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0199","scoring_system":"epss","scoring_elements":"0.83624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0199","scoring_system":"epss","scoring_elements":"0.83618","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0199","scoring_system":"epss","scoring_elements":"0.8356","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0199","scoring_system":"epss","scoring_elements":"0.83574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0199","scoring_system":"epss","scoring_elements":"0.83576","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0199","scoring_system":"epss","scoring_elements":"0.836","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0199","scoring_system":"epss","scoring_elements":"0.83608","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1575"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1001994","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1001994"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1018916","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1018916"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1020034","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1020034"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1023035","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1023035"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1032208","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1032208"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033020","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033020"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1034230","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1034230"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-74.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-74.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/70439","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70439"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.securitytracker.com/id/1031030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031030"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152357","reference_id":"1152357","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152357"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575","reference_id":"CVE-2014-1575","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1575","reference_id":"CVE-2014-1575","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1575"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-74","reference_id":"mfsa2014-74","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-74"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1575"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fwk8-2rdv-cycf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56937?format=json","vulnerability_id":"VCID-g4rq-n73t-rbcr","summary":"security update","references":[{"reference_url":"http://linux.oracle.com/errata/ELSA-2014-0918.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2014-0918.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1557.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1557.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1557","reference_id":"","reference_type":"","scores":[{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.8516","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85089","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85166","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85163","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85119","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85122","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85151","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1557"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=913805","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=913805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557"},{"reference_url":"http://secunia.com/advisories/59591","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59591"},{"reference_url":"http://secunia.com/advisories/59719","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59719"},{"reference_url":"http://secunia.com/advisories/59760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59760"},{"reference_url":"http://secunia.com/advisories/60083","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60083"},{"reference_url":"http://secunia.com/advisories/60306","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60306"},{"reference_url":"http://secunia.com/advisories/60486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60486"},{"reference_url":"http://secunia.com/advisories/60621","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60621"},{"reference_url":"http://secunia.com/advisories/60628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60628"},{"reference_url":"http://www.debian.org/security/2014/dsa-2986","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2986"},{"reference_url":"http://www.debian.org/security/2014/dsa-2996","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2996"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-64.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-64.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/68824","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68824"},{"reference_url":"http://www.securitytracker.com/id/1030619","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030619"},{"reference_url":"http://www.securitytracker.com/id/1030620","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121479","reference_id":"1121479","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121479"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1557","reference_id":"CVE-2014-1557","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1557"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-64","reference_id":"mfsa2014-64","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-64"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0918","reference_id":"RHSA-2014:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0919","reference_id":"RHSA-2014:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0919"},{"reference_url":"https://usn.ubuntu.com/2295-1/","reference_id":"USN-2295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2295-1/"},{"reference_url":"https://usn.ubuntu.com/2296-1/","reference_id":"USN-2296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2296-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1557"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g4rq-n73t-rbcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58193?format=json","vulnerability_id":"VCID-g8ft-s7wx-n7ea","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8639.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8639","reference_id":"","reference_type":"","scores":[{"value":"0.01837","scoring_system":"epss","scoring_elements":"0.82938","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01837","scoring_system":"epss","scoring_elements":"0.82873","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01837","scoring_system":"epss","scoring_elements":"0.82889","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01837","scoring_system":"epss","scoring_elements":"0.82902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01837","scoring_system":"epss","scoring_elements":"0.82898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01837","scoring_system":"epss","scoring_elements":"0.82924","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01837","scoring_system":"epss","scoring_elements":"0.82931","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01837","scoring_system":"epss","scoring_elements":"0.82947","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01837","scoring_system":"epss","scoring_elements":"0.82942","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180967","reference_id":"1180967","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180967"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-04","reference_id":"mfsa2015-04","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0046","reference_id":"RHSA-2015:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0047","reference_id":"RHSA-2015:0047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0047"},{"reference_url":"https://usn.ubuntu.com/2458-1/","reference_id":"USN-2458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2458-1/"},{"reference_url":"https://usn.ubuntu.com/2460-1/","reference_id":"USN-2460-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2460-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-8639"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g8ft-s7wx-n7ea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61252?format=json","vulnerability_id":"VCID-ggs9-bydj-sue4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1558.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1558","reference_id":"","reference_type":"","scores":[{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68321","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68256","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68366","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68276","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68296","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.6834","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1558"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1015973","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1015973"},{"reference_url":"http://secunia.com/advisories/60628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60628"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-65.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-65.html"},{"reference_url":"http://www.securitytracker.com/id/1030619","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030619"},{"reference_url":"http://www.securitytracker.com/id/1030620","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121480","reference_id":"1121480","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121480"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1558","reference_id":"CVE-2014-1558","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1558"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1558","reference_id":"CVE-2014-1558","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1558"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-65","reference_id":"mfsa2014-65","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-65"},{"reference_url":"https://usn.ubuntu.com/2295-1/","reference_id":"USN-2295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2295-1/"},{"reference_url":"https://usn.ubuntu.com/2296-1/","reference_id":"USN-2296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2296-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1558"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ggs9-bydj-sue4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61198?format=json","vulnerability_id":"VCID-gsx1-3jjx-nqan","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5612","reference_id":"","reference_type":"","scores":[{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72904","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72842","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72844","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72896","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72921","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5612"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039420","reference_id":"1039420","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612","reference_id":"CVE-2013-5612","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-106","reference_id":"mfsa2013-106","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1812","reference_id":"RHSA-2013:1812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1823","reference_id":"RHSA-2013:1823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1823"},{"reference_url":"https://usn.ubuntu.com/2052-1/","reference_id":"USN-2052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2052-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5612"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gsx1-3jjx-nqan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61292?format=json","vulnerability_id":"VCID-gx4v-yve4-gbga","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8640.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8640","reference_id":"","reference_type":"","scores":[{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.78438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.78359","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.78366","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.78397","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.7838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.78407","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.78412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01542","scoring_system":"epss","scoring_elements":"0.81374","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01542","scoring_system":"epss","scoring_elements":"0.81381","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180970","reference_id":"1180970","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640","reference_id":"CVE-2014-8640","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-05","reference_id":"mfsa2015-05","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-05"},{"reference_url":"https://usn.ubuntu.com/2458-1/","reference_id":"USN-2458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2458-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-8640"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gx4v-yve4-gbga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56976?format=json","vulnerability_id":"VCID-hb1k-vzww-8bbm","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1581.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1581.json"},{"reference_url":"https://advisories.mageia.org/MGASA-2014-0421.html","reference_id":"","reference_type":"","scores":[],"url":"https://advisories.mageia.org/MGASA-2014-0421.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1581","reference_id":"","reference_type":"","scores":[{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84678","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84715","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84737","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84744","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1581"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1068218","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1068218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586"},{"reference_url":"http://secunia.com/advisories/61387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61387"},{"reference_url":"http://secunia.com/advisories/61854","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61854"},{"reference_url":"http://secunia.com/advisories/62021","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62021"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.debian.org/security/2014/dsa-3050","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3050"},{"reference_url":"http://www.debian.org/security/2014/dsa-3061","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3061"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-79.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-79.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/70426","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70426"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.securitytracker.com/id/1031030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031030"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2373-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2373-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152363","reference_id":"1152363","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152363"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1581","reference_id":"CVE-2014-1581","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1581"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-79","reference_id":"mfsa2014-79","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-79"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1635","reference_id":"RHSA-2014:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1647","reference_id":"RHSA-2014:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1647"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"},{"reference_url":"https://usn.ubuntu.com/2373-1/","reference_id":"USN-2373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1581"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hb1k-vzww-8bbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56963?format=json","vulnerability_id":"VCID-hedr-7c4z-nfa9","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1567.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1567.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1567","reference_id":"","reference_type":"","scores":[{"value":"0.02248","scoring_system":"epss","scoring_elements":"0.84581","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02248","scoring_system":"epss","scoring_elements":"0.84503","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02248","scoring_system":"epss","scoring_elements":"0.8459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02248","scoring_system":"epss","scoring_elements":"0.84585","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02248","scoring_system":"epss","scoring_elements":"0.84518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02248","scoring_system":"epss","scoring_elements":"0.8454","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02248","scoring_system":"epss","scoring_elements":"0.84543","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02248","scoring_system":"epss","scoring_elements":"0.84565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02248","scoring_system":"epss","scoring_elements":"0.84571","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1567"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1037641","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1037641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567"},{"reference_url":"http://secunia.com/advisories/60148","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60148"},{"reference_url":"http://secunia.com/advisories/60186","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60186"},{"reference_url":"http://secunia.com/advisories/61114","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61114"},{"reference_url":"http://secunia.com/advisories/61390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61390"},{"reference_url":"http://www.debian.org/security/2014/dsa-3018","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3018"},{"reference_url":"http://www.debian.org/security/2014/dsa-3028","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3028"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-72.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-72.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/69520","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69520"},{"reference_url":"http://www.securitytracker.com/id/1030793","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030793"},{"reference_url":"http://www.securitytracker.com/id/1030794","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030794"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135869","reference_id":"1135869","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135869"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1567","reference_id":"CVE-2014-1567","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1567"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-72","reference_id":"mfsa2014-72","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-72"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1144","reference_id":"RHSA-2014:1144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1145","reference_id":"RHSA-2014:1145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1145"},{"reference_url":"https://usn.ubuntu.com/2329-1/","reference_id":"USN-2329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2329-1/"},{"reference_url":"https://usn.ubuntu.com/2330-1/","reference_id":"USN-2330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2330-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1567"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hedr-7c4z-nfa9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55679?format=json","vulnerability_id":"VCID-hmmv-8y6q-hbgc","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5601.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5601","reference_id":"","reference_type":"","scores":[{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85861","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.8579","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85802","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.8582","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85824","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85842","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85853","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85867","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85865","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023843","reference_id":"1023843","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023843"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-100","reference_id":"mfsa2013-100","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1476","reference_id":"RHSA-2013:1476","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1480","reference_id":"RHSA-2013:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1480"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"},{"reference_url":"https://usn.ubuntu.com/2010-1/","reference_id":"USN-2010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5601"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hmmv-8y6q-hbgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61227?format=json","vulnerability_id":"VCID-hrzr-h3xb-e3ed","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1536.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1536.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1536","reference_id":"","reference_type":"","scores":[{"value":"0.01355","scoring_system":"epss","scoring_elements":"0.80119","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01355","scoring_system":"epss","scoring_elements":"0.80073","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01355","scoring_system":"epss","scoring_elements":"0.80144","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01355","scoring_system":"epss","scoring_elements":"0.80128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01355","scoring_system":"epss","scoring_elements":"0.80081","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01355","scoring_system":"epss","scoring_elements":"0.80101","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01355","scoring_system":"epss","scoring_elements":"0.80089","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01355","scoring_system":"epss","scoring_elements":"0.80118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01355","scoring_system":"epss","scoring_elements":"0.80125","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1536"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=989994","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=989994"},{"reference_url":"http://secunia.com/advisories/59052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59052"},{"reference_url":"http://secunia.com/advisories/59171","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59171"},{"reference_url":"http://secunia.com/advisories/59229","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59229"},{"reference_url":"http://secunia.com/advisories/59377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59377"},{"reference_url":"http://secunia.com/advisories/59387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59387"},{"reference_url":"http://secunia.com/advisories/59425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59425"},{"reference_url":"http://secunia.com/advisories/59486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59486"},{"reference_url":"http://secunia.com/advisories/59866","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59866"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-49.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-49.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/67966","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/67966"},{"reference_url":"http://www.securitytracker.com/id/1030386","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030386"},{"reference_url":"http://www.securitytracker.com/id/1030388","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030388"},{"reference_url":"http://www.ubuntu.com/usn/USN-2243-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2243-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107419","reference_id":"1107419","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107419"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536","reference_id":"CVE-2014-1536","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1536","reference_id":"CVE-2014-1536","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1536"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-49","reference_id":"mfsa2014-49","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-49"},{"reference_url":"https://usn.ubuntu.com/2243-1/","reference_id":"USN-2243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2243-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1536"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hrzr-h3xb-e3ed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61195?format=json","vulnerability_id":"VCID-hx2h-j392-7ye8","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5603.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5603.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5603","reference_id":"","reference_type":"","scores":[{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.90004","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.89955","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.89958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.8997","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.89977","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.89993","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.89998","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.90006","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5603"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023845","reference_id":"1023845","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5603","reference_id":"CVE-2013-5603","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5603"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-102","reference_id":"mfsa2013-102","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-102"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"},{"reference_url":"https://usn.ubuntu.com/2010-1/","reference_id":"USN-2010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5603"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hx2h-j392-7ye8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59577?format=json","vulnerability_id":"VCID-jb34-jknb-yygv","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0817.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0817.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0817","reference_id":"","reference_type":"","scores":[{"value":"0.0134","scoring_system":"epss","scoring_elements":"0.80012","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0134","scoring_system":"epss","scoring_elements":"0.7996","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0134","scoring_system":"epss","scoring_elements":"0.79968","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0134","scoring_system":"epss","scoring_elements":"0.79989","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0134","scoring_system":"epss","scoring_elements":"0.79979","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0134","scoring_system":"epss","scoring_elements":"0.80007","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0134","scoring_system":"epss","scoring_elements":"0.80016","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0134","scoring_system":"epss","scoring_elements":"0.80036","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0134","scoring_system":"epss","scoring_elements":"0.8002","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1204362","reference_id":"1204362","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1204362"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-29","reference_id":"mfsa2015-29","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0718","reference_id":"RHSA-2015:0718","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0718"},{"reference_url":"https://usn.ubuntu.com/2538-1/","reference_id":"USN-2538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2538-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0817"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jb34-jknb-yygv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59581?format=json","vulnerability_id":"VCID-jj3q-bub2-y3b2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0822","reference_id":"","reference_type":"","scores":[{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70468","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70403","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70434","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70413","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70498","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70483","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195638","reference_id":"1195638","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195638"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-24","reference_id":"mfsa2015-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0265","reference_id":"RHSA-2015:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0266","reference_id":"RHSA-2015:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0629","reference_id":"RHSA-2015:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0642","reference_id":"RHSA-2015:0642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0642"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"},{"reference_url":"https://usn.ubuntu.com/2506-1/","reference_id":"USN-2506-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2506-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0822"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jj3q-bub2-y3b2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34047?format=json","vulnerability_id":"VCID-jm5w-6pdb-bbes","summary":"Multiple vulnerabilities have been discovered in Mozilla Network\n    Security Service, the worst of which could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5606.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5606.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5606","reference_id":"","reference_type":"","scores":[{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71141","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71092","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71119","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71094","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71136","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71172","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71157","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1031457","reference_id":"1031457","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1031457"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105","reference_id":"735105","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735105"},{"reference_url":"https://security.gentoo.org/glsa/201406-19","reference_id":"GLSA-201406-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-19"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-103","reference_id":"mfsa2013-103","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1791","reference_id":"RHSA-2013:1791","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1829","reference_id":"RHSA-2013:1829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0041","reference_id":"RHSA-2014:0041","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0041"},{"reference_url":"https://usn.ubuntu.com/2030-1/","reference_id":"USN-2030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2030-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5606"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jm5w-6pdb-bbes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61253?format=json","vulnerability_id":"VCID-jneb-mxc6-17a4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1559.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1559.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1559","reference_id":"","reference_type":"","scores":[{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68321","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68256","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68366","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68276","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68296","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.6834","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1559"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1026022","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1026022"},{"reference_url":"http://secunia.com/advisories/60628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60628"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-65.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-65.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securitytracker.com/id/1030619","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030619"},{"reference_url":"http://www.securitytracker.com/id/1030620","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121480","reference_id":"1121480","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121480"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1559","reference_id":"CVE-2014-1559","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1559"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1559","reference_id":"CVE-2014-1559","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1559"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-65","reference_id":"mfsa2014-65","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-65"},{"reference_url":"https://usn.ubuntu.com/2295-1/","reference_id":"USN-2295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2295-1/"},{"reference_url":"https://usn.ubuntu.com/2296-1/","reference_id":"USN-2296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2296-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1559"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jneb-mxc6-17a4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61242?format=json","vulnerability_id":"VCID-jxwt-ya4f-wqbg","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1549.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1549.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1549","reference_id":"","reference_type":"","scores":[{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86821","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86886","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86881","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86832","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86851","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86845","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86864","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86873","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1549"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1020205","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1020205"},{"reference_url":"http://secunia.com/advisories/59760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59760"},{"reference_url":"http://secunia.com/advisories/60628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60628"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-57.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-57.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/68820","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68820"},{"reference_url":"http://www.securitytracker.com/id/1030619","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030619"},{"reference_url":"http://www.securitytracker.com/id/1030620","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121470","reference_id":"1121470","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121470"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1549","reference_id":"CVE-2014-1549","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1549"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1549","reference_id":"CVE-2014-1549","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1549"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-57","reference_id":"mfsa2014-57","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-57"},{"reference_url":"https://usn.ubuntu.com/2295-1/","reference_id":"USN-2295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2295-1/"},{"reference_url":"https://usn.ubuntu.com/2296-1/","reference_id":"USN-2296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2296-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1549"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jxwt-ya4f-wqbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61204?format=json","vulnerability_id":"VCID-k1sx-wcjc-jqcr","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5619.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5619","reference_id":"","reference_type":"","scores":[{"value":"0.0173","scoring_system":"epss","scoring_elements":"0.82454","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0173","scoring_system":"epss","scoring_elements":"0.82381","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0173","scoring_system":"epss","scoring_elements":"0.82396","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0173","scoring_system":"epss","scoring_elements":"0.82413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0173","scoring_system":"epss","scoring_elements":"0.8241","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0173","scoring_system":"epss","scoring_elements":"0.82438","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0173","scoring_system":"epss","scoring_elements":"0.82445","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0173","scoring_system":"epss","scoring_elements":"0.82464","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0173","scoring_system":"epss","scoring_elements":"0.82459","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5619"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039424","reference_id":"1039424","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619","reference_id":"CVE-2013-5619","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-110","reference_id":"mfsa2013-110","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-110"},{"reference_url":"https://usn.ubuntu.com/2052-1/","reference_id":"USN-2052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2052-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5619"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k1sx-wcjc-jqcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59584?format=json","vulnerability_id":"VCID-k69z-4hzh-5yd4","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0827","reference_id":"","reference_type":"","scores":[{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76951","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76886","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76893","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76937","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76976","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76955","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195623","reference_id":"1195623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195623"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-19","reference_id":"mfsa2015-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0265","reference_id":"RHSA-2015:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0266","reference_id":"RHSA-2015:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0629","reference_id":"RHSA-2015:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0642","reference_id":"RHSA-2015:0642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0642"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"},{"reference_url":"https://usn.ubuntu.com/2506-1/","reference_id":"USN-2506-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2506-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0827"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k69z-4hzh-5yd4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56813?format=json","vulnerability_id":"VCID-k7cw-7tng-xka2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1530.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1530.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1530","reference_id":"","reference_type":"","scores":[{"value":"0.00865","scoring_system":"epss","scoring_elements":"0.75108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00865","scoring_system":"epss","scoring_elements":"0.75064","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00865","scoring_system":"epss","scoring_elements":"0.75066","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00865","scoring_system":"epss","scoring_elements":"0.75096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00865","scoring_system":"epss","scoring_elements":"0.75073","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00865","scoring_system":"epss","scoring_elements":"0.75107","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00865","scoring_system":"epss","scoring_elements":"0.75118","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00865","scoring_system":"epss","scoring_elements":"0.7514","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00865","scoring_system":"epss","scoring_elements":"0.75119","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092666","reference_id":"1092666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092666"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-43","reference_id":"mfsa2014-43","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-43"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0448","reference_id":"RHSA-2014:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0449","reference_id":"RHSA-2014:0449","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0449"},{"reference_url":"https://usn.ubuntu.com/2185-1/","reference_id":"USN-2185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2185-1/"},{"reference_url":"https://usn.ubuntu.com/2189-1/","reference_id":"USN-2189-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2189-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1530"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k7cw-7tng-xka2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61229?format=json","vulnerability_id":"VCID-kcmm-pwr4-cqcm","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1539","reference_id":"","reference_type":"","scores":[{"value":"0.0075","scoring_system":"epss","scoring_elements":"0.73135","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0075","scoring_system":"epss","scoring_elements":"0.73083","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0075","scoring_system":"epss","scoring_elements":"0.73162","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0075","scoring_system":"epss","scoring_elements":"0.73142","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0075","scoring_system":"epss","scoring_elements":"0.73093","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0075","scoring_system":"epss","scoring_elements":"0.73114","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0075","scoring_system":"epss","scoring_elements":"0.73088","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0075","scoring_system":"epss","scoring_elements":"0.73124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0075","scoring_system":"epss","scoring_elements":"0.73137","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1539"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=995603","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=995603"},{"reference_url":"http://secunia.com/advisories/59171","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59171"},{"reference_url":"http://secunia.com/advisories/59387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59387"},{"reference_url":"http://secunia.com/advisories/59486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59486"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-50.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-50.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/67967","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/67967"},{"reference_url":"http://www.securitytracker.com/id/1030388","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030388"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1539","reference_id":"CVE-2014-1539","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1539"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1539","reference_id":"CVE-2014-1539","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1539"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-50","reference_id":"mfsa2014-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-50"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1539"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kcmm-pwr4-cqcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56933?format=json","vulnerability_id":"VCID-kway-xy2z-5fak","summary":"security update","references":[{"reference_url":"http://linux.oracle.com/errata/ELSA-2014-0918.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2014-0918.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1555.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1555.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1555","reference_id":"","reference_type":"","scores":[{"value":"0.03359","scoring_system":"epss","scoring_elements":"0.87346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03359","scoring_system":"epss","scoring_elements":"0.87292","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03359","scoring_system":"epss","scoring_elements":"0.87356","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03359","scoring_system":"epss","scoring_elements":"0.8735","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03359","scoring_system":"epss","scoring_elements":"0.87302","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03359","scoring_system":"epss","scoring_elements":"0.87318","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03359","scoring_system":"epss","scoring_elements":"0.87317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03359","scoring_system":"epss","scoring_elements":"0.87336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03359","scoring_system":"epss","scoring_elements":"0.87343","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1555"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1023121","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1023121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557"},{"reference_url":"http://secunia.com/advisories/59591","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59591"},{"reference_url":"http://secunia.com/advisories/59719","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59719"},{"reference_url":"http://secunia.com/advisories/59760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59760"},{"reference_url":"http://secunia.com/advisories/60083","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60083"},{"reference_url":"http://secunia.com/advisories/60306","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60306"},{"reference_url":"http://secunia.com/advisories/60486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60486"},{"reference_url":"http://secunia.com/advisories/60621","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60621"},{"reference_url":"http://secunia.com/advisories/60628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60628"},{"reference_url":"http://www.debian.org/security/2014/dsa-2986","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2986"},{"reference_url":"http://www.debian.org/security/2014/dsa-2996","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2996"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-61.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-61.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/68814","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68814"},{"reference_url":"http://www.securitytracker.com/id/1030619","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030619"},{"reference_url":"http://www.securitytracker.com/id/1030620","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121476","reference_id":"1121476","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121476"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1555","reference_id":"CVE-2014-1555","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1555"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-61","reference_id":"mfsa2014-61","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-61"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0918","reference_id":"RHSA-2014:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0919","reference_id":"RHSA-2014:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0919"},{"reference_url":"https://usn.ubuntu.com/2295-1/","reference_id":"USN-2295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2295-1/"},{"reference_url":"https://usn.ubuntu.com/2296-1/","reference_id":"USN-2296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2296-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1555"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kway-xy2z-5fak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56659?format=json","vulnerability_id":"VCID-m5p4-q6ru-jbhr","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1477.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1477.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1477","reference_id":"","reference_type":"","scores":[{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74906","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74865","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74866","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74894","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74914","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74937","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74915","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060938","reference_id":"1060938","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060938"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-01","reference_id":"mfsa2014-01","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0132","reference_id":"RHSA-2014:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0133","reference_id":"RHSA-2014:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0133"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"},{"reference_url":"https://usn.ubuntu.com/2119-1/","reference_id":"USN-2119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2119-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1477"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m5p4-q6ru-jbhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61197?format=json","vulnerability_id":"VCID-m6b2-ap8v-e7gz","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5610.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5610.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5610","reference_id":"","reference_type":"","scores":[{"value":"0.00881","scoring_system":"epss","scoring_elements":"0.75361","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00881","scoring_system":"epss","scoring_elements":"0.75308","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00881","scoring_system":"epss","scoring_elements":"0.75311","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00881","scoring_system":"epss","scoring_elements":"0.75344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00881","scoring_system":"epss","scoring_elements":"0.75321","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00881","scoring_system":"epss","scoring_elements":"0.75365","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00881","scoring_system":"epss","scoring_elements":"0.75375","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00881","scoring_system":"epss","scoring_elements":"0.75395","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00881","scoring_system":"epss","scoring_elements":"0.75373","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5610"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039418","reference_id":"1039418","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610","reference_id":"CVE-2013-5610","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-104","reference_id":"mfsa2013-104","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-104"},{"reference_url":"https://usn.ubuntu.com/2052-1/","reference_id":"USN-2052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2052-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5610"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m6b2-ap8v-e7gz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61261?format=json","vulnerability_id":"VCID-m7a7-kcdr-pkcr","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1565.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1565.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1565","reference_id":"","reference_type":"","scores":[{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.73985","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.73936","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74011","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.73993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.73944","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.73969","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.7394","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.73974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.73988","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1565"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1047831","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1047831"},{"reference_url":"http://secunia.com/advisories/60148","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60148"},{"reference_url":"http://secunia.com/advisories/61114","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61114"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-70.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-70.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/69521","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69521"},{"reference_url":"http://www.securitytracker.com/id/1030793","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030793"},{"reference_url":"http://www.securitytracker.com/id/1030794","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030794"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135868","reference_id":"1135868","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135868"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565","reference_id":"CVE-2014-1565","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1565","reference_id":"CVE-2014-1565","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1565"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-70","reference_id":"mfsa2014-70","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-70"},{"reference_url":"https://usn.ubuntu.com/2329-1/","reference_id":"USN-2329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2329-1/"},{"reference_url":"https://usn.ubuntu.com/2330-1/","reference_id":"USN-2330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2330-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1565"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m7a7-kcdr-pkcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56809?format=json","vulnerability_id":"VCID-mg9v-rjps-9kgm","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1524.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1524.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1524","reference_id":"","reference_type":"","scores":[{"value":"0.06412","scoring_system":"epss","scoring_elements":"0.91048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06412","scoring_system":"epss","scoring_elements":"0.90997","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06412","scoring_system":"epss","scoring_elements":"0.91002","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06412","scoring_system":"epss","scoring_elements":"0.91011","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06412","scoring_system":"epss","scoring_elements":"0.91021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06412","scoring_system":"epss","scoring_elements":"0.91034","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06412","scoring_system":"epss","scoring_elements":"0.9104","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092663","reference_id":"1092663","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092663"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-38","reference_id":"mfsa2014-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0448","reference_id":"RHSA-2014:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0449","reference_id":"RHSA-2014:0449","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0449"},{"reference_url":"https://usn.ubuntu.com/2185-1/","reference_id":"USN-2185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2185-1/"},{"reference_url":"https://usn.ubuntu.com/2189-1/","reference_id":"USN-2189-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2189-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1524"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mg9v-rjps-9kgm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61260?format=json","vulnerability_id":"VCID-mv8e-2ttb-5ua8","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"},{"reference_url":"http://packetstormsecurity.com/files/128132/Mozilla-Firefox-Secret-Leak.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/128132/Mozilla-Firefox-Secret-Leak.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1564.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1564.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1564","reference_id":"","reference_type":"","scores":[{"value":"0.14285","scoring_system":"epss","scoring_elements":"0.94399","published_at":"2026-04-13T12:55:00Z"},{"value":"0.14285","scoring_system":"epss","scoring_elements":"0.94362","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14285","scoring_system":"epss","scoring_elements":"0.94395","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14285","scoring_system":"epss","scoring_elements":"0.94398","published_at":"2026-04-12T12:55:00Z"},{"value":"0.14285","scoring_system":"epss","scoring_elements":"0.9437","published_at":"2026-04-02T12:55:00Z"},{"value":"0.14285","scoring_system":"epss","scoring_elements":"0.94381","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14285","scoring_system":"epss","scoring_elements":"0.94391","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1564"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1045977","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1045977"},{"reference_url":"http://seclists.org/fulldisclosure/2014/Sep/18","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2014/Sep/18"},{"reference_url":"http://secunia.com/advisories/60148","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60148"},{"reference_url":"http://secunia.com/advisories/61114","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61114"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-69.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-69.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/archive/1/533357/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/533357/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/69525","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69525"},{"reference_url":"http://www.securitytracker.com/id/1030793","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030793"},{"reference_url":"http://www.securitytracker.com/id/1030794","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030794"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135865","reference_id":"1135865","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135865"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564","reference_id":"CVE-2014-1564","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1564","reference_id":"CVE-2014-1564","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1564"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/39295.js","reference_id":"CVE-2014-1564;OSVDB-110716","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/39295.js"},{"reference_url":"https://www.securityfocus.com/bid/69525/info","reference_id":"CVE-2014-1564;OSVDB-110716","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/69525/info"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-69","reference_id":"mfsa2014-69","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-69"},{"reference_url":"https://usn.ubuntu.com/2329-1/","reference_id":"USN-2329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2329-1/"},{"reference_url":"https://usn.ubuntu.com/2330-1/","reference_id":"USN-2330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2330-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1564"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mv8e-2ttb-5ua8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55676?format=json","vulnerability_id":"VCID-nbqt-kaag-pkcw","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5597.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5597","reference_id":"","reference_type":"","scores":[{"value":"0.03629","scoring_system":"epss","scoring_elements":"0.87831","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03629","scoring_system":"epss","scoring_elements":"0.87772","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03629","scoring_system":"epss","scoring_elements":"0.87783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03629","scoring_system":"epss","scoring_elements":"0.87794","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03629","scoring_system":"epss","scoring_elements":"0.87798","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03629","scoring_system":"epss","scoring_elements":"0.87819","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03629","scoring_system":"epss","scoring_elements":"0.87826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03629","scoring_system":"epss","scoring_elements":"0.87838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03629","scoring_system":"epss","scoring_elements":"0.87832","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023841","reference_id":"1023841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023841"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-98","reference_id":"mfsa2013-98","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-98"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1476","reference_id":"RHSA-2013:1476","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1480","reference_id":"RHSA-2013:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1480"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"},{"reference_url":"https://usn.ubuntu.com/2010-1/","reference_id":"USN-2010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5597"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nbqt-kaag-pkcw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61226?format=json","vulnerability_id":"VCID-p45t-mhpe-4ufg","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1534.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1534.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1534","reference_id":"","reference_type":"","scores":[{"value":"0.02679","scoring_system":"epss","scoring_elements":"0.85839","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02679","scoring_system":"epss","scoring_elements":"0.85766","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02679","scoring_system":"epss","scoring_elements":"0.85846","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02679","scoring_system":"epss","scoring_elements":"0.85843","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02679","scoring_system":"epss","scoring_elements":"0.85778","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02679","scoring_system":"epss","scoring_elements":"0.85797","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02679","scoring_system":"epss","scoring_elements":"0.85802","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02679","scoring_system":"epss","scoring_elements":"0.85821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02679","scoring_system":"epss","scoring_elements":"0.85831","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1534"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1000598","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1000598"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1000960","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1000960"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1002340","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1002340"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1005578","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1005578"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1007223","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1007223"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=969517","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=969517"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=969549","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=969549"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=973874","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=973874"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=978652","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=978652"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=990868","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=990868"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=995816","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=995816"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=995817","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=995817"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=996536","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=996536"},{"reference_url":"http://secunia.com/advisories/59052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59052"},{"reference_url":"http://secunia.com/advisories/59171","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59171"},{"reference_url":"http://secunia.com/advisories/59229","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59229"},{"reference_url":"http://secunia.com/advisories/59377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59377"},{"reference_url":"http://secunia.com/advisories/59387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59387"},{"reference_url":"http://secunia.com/advisories/59425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59425"},{"reference_url":"http://secunia.com/advisories/59486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59486"},{"reference_url":"http://secunia.com/advisories/59866","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59866"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-48.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-48.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/67964","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/67964"},{"reference_url":"http://www.securitytracker.com/id/1030386","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030386"},{"reference_url":"http://www.securitytracker.com/id/1030388","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030388"},{"reference_url":"http://www.ubuntu.com/usn/USN-2243-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2243-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107403","reference_id":"1107403","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107403"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534","reference_id":"CVE-2014-1534","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1534","reference_id":"CVE-2014-1534","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1534"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-48","reference_id":"mfsa2014-48","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-48"},{"reference_url":"https://usn.ubuntu.com/2243-1/","reference_id":"USN-2243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2243-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1534"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p45t-mhpe-4ufg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56983?format=json","vulnerability_id":"VCID-pbjx-qyn8-s7bt","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1583.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1583.json"},{"reference_url":"https://advisories.mageia.org/MGASA-2014-0421.html","reference_id":"","reference_type":"","scores":[],"url":"https://advisories.mageia.org/MGASA-2014-0421.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1583","reference_id":"","reference_type":"","scores":[{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73057","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73004","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73063","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73013","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73034","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73009","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73046","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73059","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1583"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1015540","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1015540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586"},{"reference_url":"http://secunia.com/advisories/61854","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61854"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.debian.org/security/2014/dsa-3050","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3050"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-82.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-82.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/70424","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70424"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.securitytracker.com/id/1031030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031030"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152683","reference_id":"1152683","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152683"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1583","reference_id":"CVE-2014-1583","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1583"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-82","reference_id":"mfsa2014-82","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-82"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1635","reference_id":"RHSA-2014:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1635"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1583"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pbjx-qyn8-s7bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61280?format=json","vulnerability_id":"VCID-pnba-jmy3-2yfa","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8632.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8632.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8632","reference_id":"","reference_type":"","scores":[{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43274","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43212","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43321","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43289","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43268","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43234","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43286","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.433","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8632"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1050340","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1050340"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-91.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-91.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169211","reference_id":"1169211","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169211"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8632","reference_id":"CVE-2014-8632","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8632"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8632","reference_id":"CVE-2014-8632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8632"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-91","reference_id":"mfsa2014-91","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-91"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-8632"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pnba-jmy3-2yfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61279?format=json","vulnerability_id":"VCID-ptkt-s26b-q7hu","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8631.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8631.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8631","reference_id":"","reference_type":"","scores":[{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44266","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44288","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44221","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44273","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8631"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=821573","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=821573"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-91.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-91.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169211","reference_id":"1169211","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169211"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8631","reference_id":"CVE-2014-8631","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8631"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8631","reference_id":"CVE-2014-8631","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8631"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-91","reference_id":"mfsa2014-91","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-91"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-8631"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ptkt-s26b-q7hu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56966?format=json","vulnerability_id":"VCID-qdev-8m9n-8bbr","summary":"security update","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html"},{"reference_url":"http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1307.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1307.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1354.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1354.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1371.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1371.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1568","reference_id":"","reference_type":"","scores":[{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96737","published_at":"2026-04-13T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96722","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.9673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96731","published_at":"2026-04-09T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96734","published_at":"2026-04-12T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96718","published_at":"2026-04-04T12:55:00Z"},{"value":"0.34437","scoring_system":"epss","scoring_elements":"0.96962","published_at":"2026-04-01T12:55:00Z"},{"value":"0.34437","scoring_system":"epss","scoring_elements":"0.9697","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1568"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1064636","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1064636"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1069405","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1069405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568"},{"reference_url":"http://secunia.com/advisories/61540","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61540"},{"reference_url":"http://secunia.com/advisories/61574","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61574"},{"reference_url":"http://secunia.com/advisories/61575","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61575"},{"reference_url":"http://secunia.com/advisories/61576","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61576"},{"reference_url":"http://secunia.com/advisories/61583","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61583"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/96194","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/96194"},{"reference_url":"http://www.debian.org/security/2014/dsa-3033","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3033"},{"reference_url":"http://www.debian.org/security/2014/dsa-3034","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3034"},{"reference_url":"http://www.debian.org/security/2014/dsa-3037","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3037"},{"reference_url":"http://www.kb.cert.org/vuls/id/772676","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/772676"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-73.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-73.html"},{"reference_url":"http://www.novell.com/support/kb/doc.php?id=7015701","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/support/kb/doc.php?id=7015701"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/70116","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70116"},{"reference_url":"http://www.ubuntu.com/usn/USN-2360-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2360-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2360-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2360-2"},{"reference_url":"http://www.ubuntu.com/usn/USN-2361-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2361-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1145429","reference_id":"1145429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1145429"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1568","reference_id":"CVE-2014-1568","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1568"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-73","reference_id":"mfsa2014-73","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-73"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1307","reference_id":"RHSA-2014:1307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1354","reference_id":"RHSA-2014:1354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1371","reference_id":"RHSA-2014:1371","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1371"},{"reference_url":"https://usn.ubuntu.com/2360-1/","reference_id":"USN-2360-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2360-1/"},{"reference_url":"https://usn.ubuntu.com/2360-2/","reference_id":"USN-2360-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2360-2/"},{"reference_url":"https://usn.ubuntu.com/2361-1/","reference_id":"USN-2361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2361-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1568"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdev-8m9n-8bbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54766?format=json","vulnerability_id":"VCID-qdqz-admy-e7cg","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1491.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1491.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1491","reference_id":"","reference_type":"","scores":[{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67166","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67093","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.6713","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67153","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67178","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.6721","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67196","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1491"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060955","reference_id":"1060955","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060955"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-12","reference_id":"mfsa2014-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0917","reference_id":"RHSA-2014:0917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0979","reference_id":"RHSA-2014:0979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1246","reference_id":"RHSA-2014:1246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1246"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"},{"reference_url":"https://usn.ubuntu.com/2119-1/","reference_id":"USN-2119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2119-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1491"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqz-admy-e7cg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61277?format=json","vulnerability_id":"VCID-qpzb-b3nx-m3cv","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1591.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1591.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1591","reference_id":"","reference_type":"","scores":[{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.5066","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.5057","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50698","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50649","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50604","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50659","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50655","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1591"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1069762","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1069762"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-86.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-86.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169207","reference_id":"1169207","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169207"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591","reference_id":"CVE-2014-1591","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1591","reference_id":"CVE-2014-1591","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1591"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-86","reference_id":"mfsa2014-86","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-86"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1591"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qpzb-b3nx-m3cv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61290?format=json","vulnerability_id":"VCID-r1ju-8ww8-yygz","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8637.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8637","reference_id":"","reference_type":"","scores":[{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.6545","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65499","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65527","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65491","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65544","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65574","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65561","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180964","reference_id":"1180964","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637","reference_id":"CVE-2014-8637","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-02","reference_id":"mfsa2015-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-02"},{"reference_url":"https://usn.ubuntu.com/2458-1/","reference_id":"USN-2458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2458-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-8637"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r1ju-8ww8-yygz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61302?format=json","vulnerability_id":"VCID-r39h-25hq-gbdz","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0828.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0828.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0828","reference_id":"","reference_type":"","scores":[{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.8014","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80095","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80139","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80164","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80148","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0828"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195621","reference_id":"1195621","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828","reference_id":"CVE-2015-0828","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-18","reference_id":"mfsa2015-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-18"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0828"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r39h-25hq-gbdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56973?format=json","vulnerability_id":"VCID-r56k-pzrk-kfbb","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1577.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1577.json"},{"reference_url":"https://advisories.mageia.org/MGASA-2014-0421.html","reference_id":"","reference_type":"","scores":[],"url":"https://advisories.mageia.org/MGASA-2014-0421.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1577","reference_id":"","reference_type":"","scores":[{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79632","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79581","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79655","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79588","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79611","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79598","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79634","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1577"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1012609","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1012609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586"},{"reference_url":"http://secunia.com/advisories/61387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61387"},{"reference_url":"http://secunia.com/advisories/61854","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61854"},{"reference_url":"http://secunia.com/advisories/62021","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62021"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.debian.org/security/2014/dsa-3050","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3050"},{"reference_url":"http://www.debian.org/security/2014/dsa-3061","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3061"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-76.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-76.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/70440","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70440"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.securitytracker.com/id/1031030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031030"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2373-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2373-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152359","reference_id":"1152359","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152359"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1577","reference_id":"CVE-2014-1577","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1577"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-76","reference_id":"mfsa2014-76","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-76"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1635","reference_id":"RHSA-2014:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1647","reference_id":"RHSA-2014:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1647"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"},{"reference_url":"https://usn.ubuntu.com/2373-1/","reference_id":"USN-2373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1577"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r56k-pzrk-kfbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61247?format=json","vulnerability_id":"VCID-r5au-uh8y-2ub7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1553.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1553.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1553","reference_id":"","reference_type":"","scores":[{"value":"0.00553","scoring_system":"epss","scoring_elements":"0.68033","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00553","scoring_system":"epss","scoring_elements":"0.67973","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00553","scoring_system":"epss","scoring_elements":"0.68082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00553","scoring_system":"epss","scoring_elements":"0.68068","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00553","scoring_system":"epss","scoring_elements":"0.67995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00553","scoring_system":"epss","scoring_elements":"0.68014","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00553","scoring_system":"epss","scoring_elements":"0.67992","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00553","scoring_system":"epss","scoring_elements":"0.68043","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00553","scoring_system":"epss","scoring_elements":"0.68058","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1553"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1022945","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1022945"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1027359","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1027359"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033121","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033121"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1035007","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1035007"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1037666","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1037666"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1041148","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1041148"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=995075","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=995075"},{"reference_url":"http://secunia.com/advisories/60148","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60148"},{"reference_url":"http://secunia.com/advisories/61114","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61114"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-67.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-67.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/69524","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69524"},{"reference_url":"http://www.securitytracker.com/id/1030793","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030793"},{"reference_url":"http://www.securitytracker.com/id/1030794","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030794"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135863","reference_id":"1135863","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135863"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553","reference_id":"CVE-2014-1553","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1553","reference_id":"CVE-2014-1553","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1553"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-67","reference_id":"mfsa2014-67","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-67"},{"reference_url":"https://usn.ubuntu.com/2329-1/","reference_id":"USN-2329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2329-1/"},{"reference_url":"https://usn.ubuntu.com/2330-1/","reference_id":"USN-2330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2330-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1553"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r5au-uh8y-2ub7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58197?format=json","vulnerability_id":"VCID-r8f9-h598-7bg5","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8641.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8641.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8641","reference_id":"","reference_type":"","scores":[{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.8126","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81197","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81205","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81228","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81268","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180973","reference_id":"1180973","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180973"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-06","reference_id":"mfsa2015-06","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0046","reference_id":"RHSA-2015:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0046"},{"reference_url":"https://usn.ubuntu.com/2458-1/","reference_id":"USN-2458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2458-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-8641"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r8f9-h598-7bg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55677?format=json","vulnerability_id":"VCID-r9u9-r48j-qkgv","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5599.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5599","reference_id":"","reference_type":"","scores":[{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85861","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.8579","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85802","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.8582","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85824","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85842","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85853","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85867","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85865","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023843","reference_id":"1023843","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023843"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-100","reference_id":"mfsa2013-100","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1476","reference_id":"RHSA-2013:1476","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1480","reference_id":"RHSA-2013:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1480"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"},{"reference_url":"https://usn.ubuntu.com/2010-1/","reference_id":"USN-2010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5599"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r9u9-r48j-qkgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59579?format=json","vulnerability_id":"VCID-rb29-1vnh-jbgw","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0818.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0818.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0818","reference_id":"","reference_type":"","scores":[{"value":"0.02087","scoring_system":"epss","scoring_elements":"0.84013","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02087","scoring_system":"epss","scoring_elements":"0.83945","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02087","scoring_system":"epss","scoring_elements":"0.83959","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02087","scoring_system":"epss","scoring_elements":"0.83975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02087","scoring_system":"epss","scoring_elements":"0.83978","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02087","scoring_system":"epss","scoring_elements":"0.84001","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02087","scoring_system":"epss","scoring_elements":"0.84008","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02087","scoring_system":"epss","scoring_elements":"0.84024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02087","scoring_system":"epss","scoring_elements":"0.84017","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1204363","reference_id":"1204363","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1204363"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-28","reference_id":"mfsa2015-28","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-28"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0718","reference_id":"RHSA-2015:0718","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0718"},{"reference_url":"https://usn.ubuntu.com/2538-1/","reference_id":"USN-2538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2538-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0818"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rb29-1vnh-jbgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61213?format=json","vulnerability_id":"VCID-rcqe-r6h3-yua2","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1489.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1489.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1489","reference_id":"","reference_type":"","scores":[{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79298","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.7925","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79257","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.7928","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79266","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79325","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79309","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1489"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060948","reference_id":"1060948","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489","reference_id":"CVE-2014-1489","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-10","reference_id":"mfsa2014-10","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-10"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1489"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rcqe-r6h3-yua2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56818?format=json","vulnerability_id":"VCID-rf6c-27qw-afh8","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1532.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1532.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1532","reference_id":"","reference_type":"","scores":[{"value":"0.04891","scoring_system":"epss","scoring_elements":"0.89587","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04891","scoring_system":"epss","scoring_elements":"0.89549","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04891","scoring_system":"epss","scoring_elements":"0.89552","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04891","scoring_system":"epss","scoring_elements":"0.89565","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04891","scoring_system":"epss","scoring_elements":"0.89566","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04891","scoring_system":"epss","scoring_elements":"0.89583","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04891","scoring_system":"epss","scoring_elements":"0.89588","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04891","scoring_system":"epss","scoring_elements":"0.89595","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04891","scoring_system":"epss","scoring_elements":"0.89594","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092670","reference_id":"1092670","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092670"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-46","reference_id":"mfsa2014-46","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-46"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0448","reference_id":"RHSA-2014:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0449","reference_id":"RHSA-2014:0449","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0449"},{"reference_url":"https://usn.ubuntu.com/2185-1/","reference_id":"USN-2185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2185-1/"},{"reference_url":"https://usn.ubuntu.com/2189-1/","reference_id":"USN-2189-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2189-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1532"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rf6c-27qw-afh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61308?format=json","vulnerability_id":"VCID-rq2s-6pv9-tyee","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0835.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0835.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0835","reference_id":"","reference_type":"","scores":[{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81184","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.8112","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81128","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81152","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.8118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81205","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81191","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0835"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195609","reference_id":"1195609","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0835","reference_id":"CVE-2015-0835","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0835"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-11","reference_id":"mfsa2015-11","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-11"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0835"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rq2s-6pv9-tyee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56979?format=json","vulnerability_id":"VCID-smdh-r7xw-pkc5","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1586.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1586.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1586","reference_id":"","reference_type":"","scores":[{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71906","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71868","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.7194","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71923","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71876","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71895","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71867","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71905","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71917","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1586"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1062981","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1062981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586"},{"reference_url":"http://secunia.com/advisories/61387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61387"},{"reference_url":"http://secunia.com/advisories/62021","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62021"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.debian.org/security/2014/dsa-3050","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3050"},{"reference_url":"http://www.debian.org/security/2014/dsa-3061","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3061"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-81.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-81.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/70427","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70427"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.securitytracker.com/id/1031030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031030"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2373-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2373-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152366","reference_id":"1152366","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152366"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1586","reference_id":"CVE-2014-1586","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1586"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-81","reference_id":"mfsa2014-81","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-81"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"},{"reference_url":"https://usn.ubuntu.com/2373-1/","reference_id":"USN-2373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1586"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-smdh-r7xw-pkc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61288?format=json","vulnerability_id":"VCID-sme4-gu3c-kkf3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8636.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8636.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8636","reference_id":"","reference_type":"","scores":[{"value":"0.83612","scoring_system":"epss","scoring_elements":"0.99287","published_at":"2026-04-13T12:55:00Z"},{"value":"0.83612","scoring_system":"epss","scoring_elements":"0.99278","published_at":"2026-04-01T12:55:00Z"},{"value":"0.83612","scoring_system":"epss","scoring_elements":"0.99279","published_at":"2026-04-02T12:55:00Z"},{"value":"0.83612","scoring_system":"epss","scoring_elements":"0.99281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.83612","scoring_system":"epss","scoring_elements":"0.99284","published_at":"2026-04-07T12:55:00Z"},{"value":"0.83612","scoring_system":"epss","scoring_elements":"0.99285","published_at":"2026-04-08T12:55:00Z"},{"value":"0.83612","scoring_system":"epss","scoring_elements":"0.99286","published_at":"2026-04-11T12:55:00Z"},{"value":"0.83612","scoring_system":"epss","scoring_elements":"0.99288","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8636"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180977","reference_id":"1180977","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636","reference_id":"CVE-2014-8636","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/36480.rb","reference_id":"CVE-2014-8636;OSVDB-117005","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/36480.rb"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-09","reference_id":"mfsa2015-09","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-09"},{"reference_url":"https://usn.ubuntu.com/2458-1/","reference_id":"USN-2458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2458-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-8636"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sme4-gu3c-kkf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56962?format=json","vulnerability_id":"VCID-snqg-4mwy-tyee","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1562.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1562.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1562","reference_id":"","reference_type":"","scores":[{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79486","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79418","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79456","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79464","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1562"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1054359","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1054359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567"},{"reference_url":"http://secunia.com/advisories/60148","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60148"},{"reference_url":"http://secunia.com/advisories/60186","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60186"},{"reference_url":"http://secunia.com/advisories/61114","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61114"},{"reference_url":"http://secunia.com/advisories/61390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61390"},{"reference_url":"http://www.debian.org/security/2014/dsa-3018","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3018"},{"reference_url":"http://www.debian.org/security/2014/dsa-3028","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3028"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-67.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-67.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/69519","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69519"},{"reference_url":"http://www.securitytracker.com/id/1030793","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030793"},{"reference_url":"http://www.securitytracker.com/id/1030794","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030794"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135862","reference_id":"1135862","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135862"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1562","reference_id":"CVE-2014-1562","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1562"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-67","reference_id":"mfsa2014-67","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-67"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1144","reference_id":"RHSA-2014:1144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1145","reference_id":"RHSA-2014:1145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1145"},{"reference_url":"https://usn.ubuntu.com/2329-1/","reference_id":"USN-2329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2329-1/"},{"reference_url":"https://usn.ubuntu.com/2330-1/","reference_id":"USN-2330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2330-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1562"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-snqg-4mwy-tyee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61262?format=json","vulnerability_id":"VCID-sxdy-axwk-8qeu","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1566","reference_id":"","reference_type":"","scores":[{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70274","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70211","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70302","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70287","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.7024","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70217","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70263","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70278","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1566"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1050690","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1050690"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-71.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-71.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/69522","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69522"},{"reference_url":"http://www.securitytracker.com/id/1030792","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030792"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1566","reference_id":"CVE-2014-1566","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1566"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1566","reference_id":"CVE-2014-1566","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1566"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-71","reference_id":"mfsa2014-71","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-71"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1566"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sxdy-axwk-8qeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61237?format=json","vulnerability_id":"VCID-tayx-jncr-qkc5","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1548.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1548.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1548","reference_id":"","reference_type":"","scores":[{"value":"0.03199","scoring_system":"epss","scoring_elements":"0.86996","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03199","scoring_system":"epss","scoring_elements":"0.86946","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03199","scoring_system":"epss","scoring_elements":"0.87007","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03199","scoring_system":"epss","scoring_elements":"0.87002","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03199","scoring_system":"epss","scoring_elements":"0.86956","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03199","scoring_system":"epss","scoring_elements":"0.86975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03199","scoring_system":"epss","scoring_elements":"0.86967","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03199","scoring_system":"epss","scoring_elements":"0.86987","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03199","scoring_system":"epss","scoring_elements":"0.86994","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1548"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1002702","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1002702"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1009675","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1009675"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1013056","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1013056"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1020008","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1020008"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1020041","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1020041"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1020219","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1020219"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1021240","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1021240"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1021312","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1021312"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1021969","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1021969"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1022773","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1022773"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1028358","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1028358"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1034383","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1034383"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1035438","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1035438"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=990096","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=990096"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=994444","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=994444"},{"reference_url":"http://secunia.com/advisories/59719","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59719"},{"reference_url":"http://secunia.com/advisories/59760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59760"},{"reference_url":"http://secunia.com/advisories/60083","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60083"},{"reference_url":"http://secunia.com/advisories/60621","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60621"},{"reference_url":"http://secunia.com/advisories/60628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60628"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-56.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-56.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/68818","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68818"},{"reference_url":"http://www.securitytracker.com/id/1030619","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030619"},{"reference_url":"http://www.securitytracker.com/id/1030620","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121469","reference_id":"1121469","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121469"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548","reference_id":"CVE-2014-1548","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1548","reference_id":"CVE-2014-1548","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1548"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-56","reference_id":"mfsa2014-56","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-56"},{"reference_url":"https://usn.ubuntu.com/2295-1/","reference_id":"USN-2295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2295-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1548"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tayx-jncr-qkc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55678?format=json","vulnerability_id":"VCID-tbmc-kpsc-ukhj","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5600.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5600","reference_id":"","reference_type":"","scores":[{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85861","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.8579","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85802","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.8582","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85824","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85842","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85853","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85867","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02688","scoring_system":"epss","scoring_elements":"0.85865","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023843","reference_id":"1023843","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023843"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-100","reference_id":"mfsa2013-100","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1476","reference_id":"RHSA-2013:1476","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1480","reference_id":"RHSA-2013:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1480"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"},{"reference_url":"https://usn.ubuntu.com/2010-1/","reference_id":"USN-2010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5600"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tbmc-kpsc-ukhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61217?format=json","vulnerability_id":"VCID-tjdk-a9k7-8fe4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1499.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1499.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1499","reference_id":"","reference_type":"","scores":[{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69783","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69721","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69733","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69749","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69726","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69774","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69789","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69798","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1499"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077019","reference_id":"1077019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1499","reference_id":"CVE-2014-1499","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1499"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-19","reference_id":"mfsa2014-19","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-19"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1499"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tjdk-a9k7-8fe4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56704?format=json","vulnerability_id":"VCID-u9bh-bnz3-8kbq","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1512.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1512","reference_id":"","reference_type":"","scores":[{"value":"0.12933","scoring_system":"epss","scoring_elements":"0.94063","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12933","scoring_system":"epss","scoring_elements":"0.94023","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12933","scoring_system":"epss","scoring_elements":"0.94033","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12933","scoring_system":"epss","scoring_elements":"0.94043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12933","scoring_system":"epss","scoring_elements":"0.94046","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12933","scoring_system":"epss","scoring_elements":"0.94055","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12933","scoring_system":"epss","scoring_elements":"0.94059","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077491","reference_id":"1077491","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077491"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-30","reference_id":"mfsa2014-30","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0310","reference_id":"RHSA-2014:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0316","reference_id":"RHSA-2014:0316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0316"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"},{"reference_url":"https://usn.ubuntu.com/2151-1/","reference_id":"USN-2151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2151-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1512"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u9bh-bnz3-8kbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61219?format=json","vulnerability_id":"VCID-ucnp-qr6h-gyg9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1502.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1502","reference_id":"","reference_type":"","scores":[{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51758","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51659","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.5171","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51695","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.5175","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51746","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51796","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51775","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1502"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077021","reference_id":"1077021","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077021"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1502","reference_id":"CVE-2014-1502","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1502"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-22","reference_id":"mfsa2014-22","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-22"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1502"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ucnp-qr6h-gyg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61221?format=json","vulnerability_id":"VCID-v81u-gbpt-xqae","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1519","reference_id":"","reference_type":"","scores":[{"value":"0.02191","scoring_system":"epss","scoring_elements":"0.84386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02191","scoring_system":"epss","scoring_elements":"0.84315","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02191","scoring_system":"epss","scoring_elements":"0.84329","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02191","scoring_system":"epss","scoring_elements":"0.8435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02191","scoring_system":"epss","scoring_elements":"0.84352","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02191","scoring_system":"epss","scoring_elements":"0.84374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02191","scoring_system":"epss","scoring_elements":"0.84379","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02191","scoring_system":"epss","scoring_elements":"0.84397","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02191","scoring_system":"epss","scoring_elements":"0.8439","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1519","reference_id":"CVE-2014-1519","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1519"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-34","reference_id":"mfsa2014-34","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-34"},{"reference_url":"https://usn.ubuntu.com/2185-1/","reference_id":"USN-2185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2185-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1519"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v81u-gbpt-xqae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56662?format=json","vulnerability_id":"VCID-vakw-28yu-9qhy","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1481.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1481.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1481","reference_id":"","reference_type":"","scores":[{"value":"0.02581","scoring_system":"epss","scoring_elements":"0.85566","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02581","scoring_system":"epss","scoring_elements":"0.85494","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02581","scoring_system":"epss","scoring_elements":"0.85507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02581","scoring_system":"epss","scoring_elements":"0.85523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02581","scoring_system":"epss","scoring_elements":"0.85528","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02581","scoring_system":"epss","scoring_elements":"0.85548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02581","scoring_system":"epss","scoring_elements":"0.85558","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02581","scoring_system":"epss","scoring_elements":"0.85573","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02581","scoring_system":"epss","scoring_elements":"0.8557","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060952","reference_id":"1060952","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060952"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-13","reference_id":"mfsa2014-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0132","reference_id":"RHSA-2014:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0133","reference_id":"RHSA-2014:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0133"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"},{"reference_url":"https://usn.ubuntu.com/2119-1/","reference_id":"USN-2119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2119-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1481"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vakw-28yu-9qhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61268?format=json","vulnerability_id":"VCID-vc55-3zmr-u3bp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1584.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1584.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1584","reference_id":"","reference_type":"","scores":[{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71572","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71643","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71627","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71596","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71609","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.7162","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1584"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1066190","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1066190"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-80.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-80.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/70434","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70434"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152364","reference_id":"1152364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152364"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1584","reference_id":"CVE-2014-1584","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1584"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1584","reference_id":"CVE-2014-1584","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1584"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-80","reference_id":"mfsa2014-80","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-80"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1584"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vc55-3zmr-u3bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55680?format=json","vulnerability_id":"VCID-vd9t-a74z-v7e9","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5602.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5602","reference_id":"","reference_type":"","scores":[{"value":"0.03229","scoring_system":"epss","scoring_elements":"0.87066","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03229","scoring_system":"epss","scoring_elements":"0.87013","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03229","scoring_system":"epss","scoring_elements":"0.87025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03229","scoring_system":"epss","scoring_elements":"0.87043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03229","scoring_system":"epss","scoring_elements":"0.87036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03229","scoring_system":"epss","scoring_elements":"0.87056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03229","scoring_system":"epss","scoring_elements":"0.87064","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03229","scoring_system":"epss","scoring_elements":"0.87077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03229","scoring_system":"epss","scoring_elements":"0.87071","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023844","reference_id":"1023844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023844"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-101","reference_id":"mfsa2013-101","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1476","reference_id":"RHSA-2013:1476","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1480","reference_id":"RHSA-2013:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1480"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"},{"reference_url":"https://usn.ubuntu.com/2010-1/","reference_id":"USN-2010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5602"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vd9t-a74z-v7e9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56661?format=json","vulnerability_id":"VCID-vg52-dyxw-4kes","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1479.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1479.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1479","reference_id":"","reference_type":"","scores":[{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80905","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80847","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80855","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80878","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80903","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80912","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80928","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01468","scoring_system":"epss","scoring_elements":"0.80914","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060940","reference_id":"1060940","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060940"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-02","reference_id":"mfsa2014-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0132","reference_id":"RHSA-2014:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0133","reference_id":"RHSA-2014:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0133"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"},{"reference_url":"https://usn.ubuntu.com/2119-1/","reference_id":"USN-2119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2119-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1479"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vg52-dyxw-4kes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61196?format=json","vulnerability_id":"VCID-vg9h-jcc1-9qeg","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5609","reference_id":"","reference_type":"","scores":[{"value":"0.02752","scoring_system":"epss","scoring_elements":"0.86003","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02752","scoring_system":"epss","scoring_elements":"0.85941","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02752","scoring_system":"epss","scoring_elements":"0.85952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02752","scoring_system":"epss","scoring_elements":"0.85968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02752","scoring_system":"epss","scoring_elements":"0.85967","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02752","scoring_system":"epss","scoring_elements":"0.85986","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02752","scoring_system":"epss","scoring_elements":"0.85996","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02752","scoring_system":"epss","scoring_elements":"0.8601","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02752","scoring_system":"epss","scoring_elements":"0.86008","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5609"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039417","reference_id":"1039417","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609","reference_id":"CVE-2013-5609","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-104","reference_id":"mfsa2013-104","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1812","reference_id":"RHSA-2013:1812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1823","reference_id":"RHSA-2013:1823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1823"},{"reference_url":"https://usn.ubuntu.com/2052-1/","reference_id":"USN-2052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2052-1/"},{"reference_url":"https://usn.ubuntu.com/2053-1/","reference_id":"USN-2053-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2053-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5609"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vg9h-jcc1-9qeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57036?format=json","vulnerability_id":"VCID-vhpz-366r-hbg1","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1590.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1590.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1590","reference_id":"","reference_type":"","scores":[{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77147","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77234","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77213","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77154","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77183","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77198","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77206","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1590"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1087633","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1087633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"http://www.debian.org/security/2014/dsa-3090","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3090"},{"reference_url":"http://www.debian.org/security/2014/dsa-3092","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3092"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-85.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-85.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/71397","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71397"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169206","reference_id":"1169206","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169206"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1590","reference_id":"CVE-2014-1590","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1590"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-85","reference_id":"mfsa2014-85","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-85"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1919","reference_id":"RHSA-2014:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1924","reference_id":"RHSA-2014:1924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1924"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"},{"reference_url":"https://usn.ubuntu.com/2428-1/","reference_id":"USN-2428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1590"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vhpz-366r-hbg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61200?format=json","vulnerability_id":"VCID-vhq8-wmxx-wqgt","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5614","reference_id":"","reference_type":"","scores":[{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51227","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51278","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51303","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51263","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51318","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51358","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51337","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5614"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039421","reference_id":"1039421","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614","reference_id":"CVE-2013-5614","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-107","reference_id":"mfsa2013-107","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1812","reference_id":"RHSA-2013:1812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1823","reference_id":"RHSA-2013:1823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1823"},{"reference_url":"https://usn.ubuntu.com/2052-1/","reference_id":"USN-2052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2052-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5614"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vhq8-wmxx-wqgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61296?format=json","vulnerability_id":"VCID-vjt1-8bvw-d7dp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0820","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56746","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56632","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56748","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56725","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5679","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56767","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820","reference_id":"CVE-2015-0820","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-27","reference_id":"mfsa2015-27","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-27"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0820"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vjt1-8bvw-d7dp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56695?format=json","vulnerability_id":"VCID-vw8m-869a-c7gn","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1497.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1497.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1497","reference_id":"","reference_type":"","scores":[{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.6595","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.65992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.6602","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.65987","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66037","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66049","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66068","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66055","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077016","reference_id":"1077016","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077016"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-17","reference_id":"mfsa2014-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0310","reference_id":"RHSA-2014:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0316","reference_id":"RHSA-2014:0316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0316"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"},{"reference_url":"https://usn.ubuntu.com/2151-1/","reference_id":"USN-2151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2151-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1497"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vw8m-869a-c7gn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56928?format=json","vulnerability_id":"VCID-w5wp-ujx1-vkhp","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1544.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1544.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1544","reference_id":"","reference_type":"","scores":[{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.8348","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83416","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83491","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83485","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83429","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83443","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83442","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83467","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83476","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1544"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=963150","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=963150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557"},{"reference_url":"http://secunia.com/advisories/59591","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59591"},{"reference_url":"http://secunia.com/advisories/59719","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59719"},{"reference_url":"http://secunia.com/advisories/59760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59760"},{"reference_url":"http://secunia.com/advisories/60083","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60083"},{"reference_url":"http://secunia.com/advisories/60486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60486"},{"reference_url":"http://secunia.com/advisories/60621","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60621"},{"reference_url":"http://secunia.com/advisories/60628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60628"},{"reference_url":"http://www.debian.org/security/2014/dsa-2986","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2986"},{"reference_url":"http://www.debian.org/security/2014/dsa-2996","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2996"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-63.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-63.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/68816","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68816"},{"reference_url":"http://www.securitytracker.com/id/1030617","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030617"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1116198","reference_id":"1116198","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1116198"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1544","reference_id":"CVE-2014-1544","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1544"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-63","reference_id":"mfsa2014-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-63"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0915","reference_id":"RHSA-2014:0915","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0915"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0916","reference_id":"RHSA-2014:0916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0916"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0917","reference_id":"RHSA-2014:0917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1165","reference_id":"RHSA-2014:1165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1165"},{"reference_url":"https://usn.ubuntu.com/2295-1/","reference_id":"USN-2295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2295-1/"},{"reference_url":"https://usn.ubuntu.com/2296-1/","reference_id":"USN-2296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2296-1/"},{"reference_url":"https://usn.ubuntu.com/2343-1/","reference_id":"USN-2343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2343-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1544"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w5wp-ujx1-vkhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61304?format=json","vulnerability_id":"VCID-w63q-84j6-h7dk","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0830","reference_id":"","reference_type":"","scores":[{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76255","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76192","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76198","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.7623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.7621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76256","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76259","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0830"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195613","reference_id":"1195613","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830","reference_id":"CVE-2015-0830","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-14","reference_id":"mfsa2015-14","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-14"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0830"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w63q-84j6-h7dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61243?format=json","vulnerability_id":"VCID-wauk-j6s7-hugt","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1550.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1550.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1550","reference_id":"","reference_type":"","scores":[{"value":"0.03758","scoring_system":"epss","scoring_elements":"0.88037","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03758","scoring_system":"epss","scoring_elements":"0.87978","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03758","scoring_system":"epss","scoring_elements":"0.88044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03758","scoring_system":"epss","scoring_elements":"0.88036","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03758","scoring_system":"epss","scoring_elements":"0.87988","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03758","scoring_system":"epss","scoring_elements":"0.88002","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03758","scoring_system":"epss","scoring_elements":"0.88007","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03758","scoring_system":"epss","scoring_elements":"0.88027","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03758","scoring_system":"epss","scoring_elements":"0.88034","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1550"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1020411","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1020411"},{"reference_url":"http://secunia.com/advisories/59760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59760"},{"reference_url":"http://secunia.com/advisories/60628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60628"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-58.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-58.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securitytracker.com/id/1030619","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030619"},{"reference_url":"http://www.securitytracker.com/id/1030620","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121472","reference_id":"1121472","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121472"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1550","reference_id":"CVE-2014-1550","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1550"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1550","reference_id":"CVE-2014-1550","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1550"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-58","reference_id":"mfsa2014-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-58"},{"reference_url":"https://usn.ubuntu.com/2295-1/","reference_id":"USN-2295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2295-1/"},{"reference_url":"https://usn.ubuntu.com/2296-1/","reference_id":"USN-2296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2296-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1550"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wauk-j6s7-hugt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34045?format=json","vulnerability_id":"VCID-wkfm-csjp-v7bx","summary":"Multiple vulnerabilities have been discovered in Mozilla Network\n    Security Service, the worst of which could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2566.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2566.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2566","reference_id":"","reference_type":"","scores":[{"value":"0.90757","scoring_system":"epss","scoring_elements":"0.99622","published_at":"2026-04-01T12:55:00Z"},{"value":"0.90757","scoring_system":"epss","scoring_elements":"0.99621","published_at":"2026-04-02T12:55:00Z"},{"value":"0.90757","scoring_system":"epss","scoring_elements":"0.99623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.90757","scoring_system":"epss","scoring_elements":"0.99624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.90757","scoring_system":"epss","scoring_elements":"0.99625","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2566"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=921947","reference_id":"921947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=921947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566","reference_id":"CVE-2013-2566","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566"},{"reference_url":"https://security.gentoo.org/glsa/201406-19","reference_id":"GLSA-201406-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-19"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-103","reference_id":"mfsa2013-103","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-103"},{"reference_url":"https://usn.ubuntu.com/2031-1/","reference_id":"USN-2031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2031-1/"},{"reference_url":"https://usn.ubuntu.com/2032-1/","reference_id":"USN-2032-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2032-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-2566"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wkfm-csjp-v7bx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61214?format=json","vulnerability_id":"VCID-ws75-69mb-ryc7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1494.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1494.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1494","reference_id":"","reference_type":"","scores":[{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68129","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68067","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68108","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68085","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68136","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68151","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68176","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68162","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1494"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077014","reference_id":"1077014","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077014"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1494","reference_id":"CVE-2014-1494","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1494"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-15","reference_id":"mfsa2014-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-15"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1494"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ws75-69mb-ryc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61212?format=json","vulnerability_id":"VCID-x8t2-vbc7-e3a6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1488.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1488.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1488","reference_id":"","reference_type":"","scores":[{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.7787","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77877","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77918","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77928","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1488"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060949","reference_id":"1060949","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488","reference_id":"CVE-2014-1488","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-11","reference_id":"mfsa2014-11","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-11"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1488"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x8t2-vbc7-e3a6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61208?format=json","vulnerability_id":"VCID-x99v-uyfe-w3ft","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1478.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1478","reference_id":"","reference_type":"","scores":[{"value":"0.01231","scoring_system":"epss","scoring_elements":"0.79179","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01231","scoring_system":"epss","scoring_elements":"0.79121","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01231","scoring_system":"epss","scoring_elements":"0.79128","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01231","scoring_system":"epss","scoring_elements":"0.79153","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01231","scoring_system":"epss","scoring_elements":"0.79138","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01231","scoring_system":"epss","scoring_elements":"0.79162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01231","scoring_system":"epss","scoring_elements":"0.7917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01231","scoring_system":"epss","scoring_elements":"0.79195","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1478"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060939","reference_id":"1060939","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1478","reference_id":"CVE-2014-1478","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1478"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-01","reference_id":"mfsa2014-01","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-01"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1478"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x99v-uyfe-w3ft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61278?format=json","vulnerability_id":"VCID-xbab-79ux-t3bn","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00008.html"},{"reference_url":"https://advisories.mageia.org/MGASA-2014-0421.html","reference_id":"","reference_type":"","scores":[],"url":"https://advisories.mageia.org/MGASA-2014-0421.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5369","reference_id":"","reference_type":"","scores":[{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68924","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68857","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68875","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68895","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68968","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68953","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5369"},{"reference_url":"http://secunia.com/advisories/60779","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60779"},{"reference_url":"http://secunia.com/advisories/60887","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60887"},{"reference_url":"http://secunia.com/advisories/61854","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61854"},{"reference_url":"http://sourceforge.net/p/enigmail/bugs/294/","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/p/enigmail/bugs/294/"},{"reference_url":"http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/08/18/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/08/18/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/08/22/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/08/22/1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:enigmail:enigmail:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:enigmail:enigmail:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5369","reference_id":"CVE-2014-5369","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5369"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-5369"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xbab-79ux-t3bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61220?format=json","vulnerability_id":"VCID-xkrc-t2jn-dqfb","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1504.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1504.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1504","reference_id":"","reference_type":"","scores":[{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69623","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69555","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69567","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69562","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69612","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69629","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69652","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69637","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1504"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077022","reference_id":"1077022","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1504","reference_id":"CVE-2014-1504","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1504"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-23","reference_id":"mfsa2014-23","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-23"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1504"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xkrc-t2jn-dqfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61306?format=json","vulnerability_id":"VCID-xqqq-rk53-ubhp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0833","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16149","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1608","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16264","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16325","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16123","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16275","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833","reference_id":"CVE-2015-0833","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-12","reference_id":"mfsa2015-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-12"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-58","reference_id":"mfsa2015-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-58"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0833"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqqq-rk53-ubhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56665?format=json","vulnerability_id":"VCID-xqv7-v1pk-p3f9","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1486.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1486.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1486","reference_id":"","reference_type":"","scores":[{"value":"0.10821","scoring_system":"epss","scoring_elements":"0.93359","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10821","scoring_system":"epss","scoring_elements":"0.93329","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10821","scoring_system":"epss","scoring_elements":"0.93337","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10821","scoring_system":"epss","scoring_elements":"0.93344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10821","scoring_system":"epss","scoring_elements":"0.93343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10821","scoring_system":"epss","scoring_elements":"0.93351","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10821","scoring_system":"epss","scoring_elements":"0.93356","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10821","scoring_system":"epss","scoring_elements":"0.9336","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10821","scoring_system":"epss","scoring_elements":"0.93358","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060945","reference_id":"1060945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060945"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-08","reference_id":"mfsa2014-08","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0132","reference_id":"RHSA-2014:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0133","reference_id":"RHSA-2014:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0133"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"},{"reference_url":"https://usn.ubuntu.com/2119-1/","reference_id":"USN-2119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2119-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1486"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqv7-v1pk-p3f9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61266?format=json","vulnerability_id":"VCID-xs3q-48t9-1qgn","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1580.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1580.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1580","reference_id":"","reference_type":"","scores":[{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63897","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63818","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.6393","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63906","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63863","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63914","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63931","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1580"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1063733","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1063733"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-78.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-78.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/70431","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70431"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152362","reference_id":"1152362","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152362"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580","reference_id":"CVE-2014-1580","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1580","reference_id":"CVE-2014-1580","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1580"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-78","reference_id":"mfsa2014-78","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-78"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1580"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xs3q-48t9-1qgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56930?format=json","vulnerability_id":"VCID-xy7m-y1mb-n3bv","summary":"security update","references":[{"reference_url":"http://linux.oracle.com/errata/ELSA-2014-0918.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2014-0918.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1547.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1547.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1547","reference_id":"","reference_type":"","scores":[{"value":"0.02205","scoring_system":"epss","scoring_elements":"0.84444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02205","scoring_system":"epss","scoring_elements":"0.84371","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02205","scoring_system":"epss","scoring_elements":"0.84454","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02205","scoring_system":"epss","scoring_elements":"0.84448","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02205","scoring_system":"epss","scoring_elements":"0.84385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02205","scoring_system":"epss","scoring_elements":"0.84406","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02205","scoring_system":"epss","scoring_elements":"0.84408","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02205","scoring_system":"epss","scoring_elements":"0.8443","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02205","scoring_system":"epss","scoring_elements":"0.84435","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1547"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1012694","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1012694"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1019684","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1019684"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024765","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024765"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=985070","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=985070"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557"},{"reference_url":"http://secunia.com/advisories/59591","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59591"},{"reference_url":"http://secunia.com/advisories/59719","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59719"},{"reference_url":"http://secunia.com/advisories/59760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59760"},{"reference_url":"http://secunia.com/advisories/60083","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60083"},{"reference_url":"http://secunia.com/advisories/60306","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60306"},{"reference_url":"http://secunia.com/advisories/60486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60486"},{"reference_url":"http://secunia.com/advisories/60621","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60621"},{"reference_url":"http://secunia.com/advisories/60628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60628"},{"reference_url":"http://www.debian.org/security/2014/dsa-2986","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2986"},{"reference_url":"http://www.debian.org/security/2014/dsa-2996","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2996"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-56.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-56.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/68811","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68811"},{"reference_url":"http://www.securitytracker.com/id/1030619","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030619"},{"reference_url":"http://www.securitytracker.com/id/1030620","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121464","reference_id":"1121464","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121464"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1547","reference_id":"CVE-2014-1547","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1547"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-56","reference_id":"mfsa2014-56","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0918","reference_id":"RHSA-2014:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0919","reference_id":"RHSA-2014:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0919"},{"reference_url":"https://usn.ubuntu.com/2295-1/","reference_id":"USN-2295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2295-1/"},{"reference_url":"https://usn.ubuntu.com/2296-1/","reference_id":"USN-2296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2296-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1547"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xy7m-y1mb-n3bv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61211?format=json","vulnerability_id":"VCID-xymx-1zrp-syg3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1485.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1485.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1485","reference_id":"","reference_type":"","scores":[{"value":"0.00964","scoring_system":"epss","scoring_elements":"0.76549","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00964","scoring_system":"epss","scoring_elements":"0.76485","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00964","scoring_system":"epss","scoring_elements":"0.76489","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00964","scoring_system":"epss","scoring_elements":"0.76518","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00964","scoring_system":"epss","scoring_elements":"0.765","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00964","scoring_system":"epss","scoring_elements":"0.76533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00964","scoring_system":"epss","scoring_elements":"0.76544","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00964","scoring_system":"epss","scoring_elements":"0.7657","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1485"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060944","reference_id":"1060944","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060944"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485","reference_id":"CVE-2014-1485","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-07","reference_id":"mfsa2014-07","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-07"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1485"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xymx-1zrp-syg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61267?format=json","vulnerability_id":"VCID-y2tp-wrva-hkc5","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1582.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1582.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1582","reference_id":"","reference_type":"","scores":[{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.7534","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75285","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75373","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75351","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75289","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75342","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75352","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1582"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1049095","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1049095"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-80.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-80.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/70432","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70432"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152364","reference_id":"1152364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152364"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1582","reference_id":"CVE-2014-1582","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1582"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1582","reference_id":"CVE-2014-1582","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1582"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-80","reference_id":"mfsa2014-80","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-80"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1582"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y2tp-wrva-hkc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56667?format=json","vulnerability_id":"VCID-y3b2-26sv-97a5","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1487.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1487.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1487","reference_id":"","reference_type":"","scores":[{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69679","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69691","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69708","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69752","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69773","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69758","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060947","reference_id":"1060947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1060947"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-09","reference_id":"mfsa2014-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0132","reference_id":"RHSA-2014:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0133","reference_id":"RHSA-2014:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0133"},{"reference_url":"https://usn.ubuntu.com/2102-1/","reference_id":"USN-2102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2102-1/"},{"reference_url":"https://usn.ubuntu.com/2119-1/","reference_id":"USN-2119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2119-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1487"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y3b2-26sv-97a5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61192?format=json","vulnerability_id":"VCID-y9mj-mmex-vbeu","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5593.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5593.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5593","reference_id":"","reference_type":"","scores":[{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65192","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65111","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65161","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65186","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65152","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65233","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.6522","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5593"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023836","reference_id":"1023836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1023836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5593","reference_id":"CVE-2013-5593","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5593"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-94","reference_id":"mfsa2013-94","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-94"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"},{"reference_url":"https://usn.ubuntu.com/2010-1/","reference_id":"USN-2010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5593"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y9mj-mmex-vbeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61191?format=json","vulnerability_id":"VCID-yau8-zmtt-1ke1","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5592","reference_id":"","reference_type":"","scores":[{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.85785","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.85711","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.85723","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.85742","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.85748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.85767","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.85777","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.85792","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.85788","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5592","reference_id":"CVE-2013-5592","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5592"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-93","reference_id":"mfsa2013-93","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-93"},{"reference_url":"https://usn.ubuntu.com/2009-1/","reference_id":"USN-2009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2009-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5592"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yau8-zmtt-1ke1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61215?format=json","vulnerability_id":"VCID-ydrd-xcq5-67aj","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1496.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1496.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1496","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19772","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20004","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19812","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19874","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19829","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1496"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077015","reference_id":"1077015","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1496","reference_id":"CVE-2014-1496","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1496"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-16","reference_id":"mfsa2014-16","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-16"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1496"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ydrd-xcq5-67aj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61216?format=json","vulnerability_id":"VCID-ypmc-2484-3fev","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1498.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1498.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1498","reference_id":"","reference_type":"","scores":[{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67907","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67869","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67956","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67943","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1498"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077018","reference_id":"1077018","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077018"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1498","reference_id":"CVE-2014-1498","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1498"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-18","reference_id":"mfsa2014-18","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-18"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1498"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ypmc-2484-3fev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61283?format=json","vulnerability_id":"VCID-yu2w-6fdx-93aq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8635.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8635","reference_id":"","reference_type":"","scores":[{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81964","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81908","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.8193","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81927","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.8198","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81969","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8635"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180963","reference_id":"1180963","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180963"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8635","reference_id":"CVE-2014-8635","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8635"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-01","reference_id":"mfsa2015-01","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-01"},{"reference_url":"https://usn.ubuntu.com/2458-1/","reference_id":"USN-2458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2458-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-8635"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yu2w-6fdx-93aq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56911?format=json","vulnerability_id":"VCID-yujw-37a2-h7b9","summary":"security update","references":[{"reference_url":"http://linux.oracle.com/errata/ELSA-2014-0741.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2014-0741.html"},{"reference_url":"http://linux.oracle.com/errata/ELSA-2014-0742.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2014-0742.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0741.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0741.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0742.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0742.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1533.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1533.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1533","reference_id":"","reference_type":"","scores":[{"value":"0.03197","scoring_system":"epss","scoring_elements":"0.86992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03197","scoring_system":"epss","scoring_elements":"0.86942","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03197","scoring_system":"epss","scoring_elements":"0.87003","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03197","scoring_system":"epss","scoring_elements":"0.86998","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03197","scoring_system":"epss","scoring_elements":"0.86952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03197","scoring_system":"epss","scoring_elements":"0.86971","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03197","scoring_system":"epss","scoring_elements":"0.86963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03197","scoring_system":"epss","scoring_elements":"0.86983","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03197","scoring_system":"epss","scoring_elements":"0.8699","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1533"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1009952","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1009952"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011007","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011007"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=921622","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=921622"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=967354","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=967354"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=978811","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=978811"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=988719","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=988719"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=991981","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=991981"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=992274","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=992274"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=994907","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=994907"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=995679","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=995679"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=996715","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=996715"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=999651","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=999651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545"},{"reference_url":"http://secunia.com/advisories/58984","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/58984"},{"reference_url":"http://secunia.com/advisories/59052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59052"},{"reference_url":"http://secunia.com/advisories/59149","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59149"},{"reference_url":"http://secunia.com/advisories/59150","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59150"},{"reference_url":"http://secunia.com/advisories/59165","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59165"},{"reference_url":"http://secunia.com/advisories/59169","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59169"},{"reference_url":"http://secunia.com/advisories/59170","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59170"},{"reference_url":"http://secunia.com/advisories/59171","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59171"},{"reference_url":"http://secunia.com/advisories/59229","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59229"},{"reference_url":"http://secunia.com/advisories/59275","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59275"},{"reference_url":"http://secunia.com/advisories/59328","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59328"},{"reference_url":"http://secunia.com/advisories/59377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59377"},{"reference_url":"http://secunia.com/advisories/59387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59387"},{"reference_url":"http://secunia.com/advisories/59425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59425"},{"reference_url":"http://secunia.com/advisories/59486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59486"},{"reference_url":"http://secunia.com/advisories/59866","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59866"},{"reference_url":"http://www.debian.org/security/2014/dsa-2955","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2955"},{"reference_url":"http://www.debian.org/security/2014/dsa-2960","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2960"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-48.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-48.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/67965","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/67965"},{"reference_url":"http://www.securitytracker.com/id/1030386","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030386"},{"reference_url":"http://www.securitytracker.com/id/1030388","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030388"},{"reference_url":"http://www.ubuntu.com/usn/USN-2243-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2243-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2250-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2250-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107399","reference_id":"1107399","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1107399"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1533","reference_id":"CVE-2014-1533","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1533"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-48","reference_id":"mfsa2014-48","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-48"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0741","reference_id":"RHSA-2014:0741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0742","reference_id":"RHSA-2014:0742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0742"},{"reference_url":"https://usn.ubuntu.com/2243-1/","reference_id":"USN-2243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2243-1/"},{"reference_url":"https://usn.ubuntu.com/2250-1/","reference_id":"USN-2250-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2250-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1533"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yujw-37a2-h7b9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61201?format=json","vulnerability_id":"VCID-yv1t-4nze-rqf6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5615.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5615.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5615","reference_id":"","reference_type":"","scores":[{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83648","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83661","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83676","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83678","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83702","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83709","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83718","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5615"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039430","reference_id":"1039430","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1039430"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615","reference_id":"CVE-2013-5615","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-115","reference_id":"mfsa2013-115","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2013-115"},{"reference_url":"https://usn.ubuntu.com/2052-1/","reference_id":"USN-2052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2052-1/"},{"reference_url":"https://usn.ubuntu.com/2053-1/","reference_id":"USN-2053-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2053-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2013-5615"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yv1t-4nze-rqf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56977?format=json","vulnerability_id":"VCID-za1s-65ue-nqdz","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1585.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1585.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1585","reference_id":"","reference_type":"","scores":[{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71906","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71868","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.7194","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71923","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71876","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71895","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71867","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71905","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71917","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1585"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1062876","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1062876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586"},{"reference_url":"http://secunia.com/advisories/61387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61387"},{"reference_url":"http://secunia.com/advisories/62021","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62021"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.debian.org/security/2014/dsa-3050","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3050"},{"reference_url":"http://www.debian.org/security/2014/dsa-3061","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3061"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-81.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-81.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/70425","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70425"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.securitytracker.com/id/1031030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031030"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2373-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2373-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152366","reference_id":"1152366","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152366"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1585","reference_id":"CVE-2014-1585","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1585"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-81","reference_id":"mfsa2014-81","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-81"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"},{"reference_url":"https://usn.ubuntu.com/2373-1/","reference_id":"USN-2373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1585"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-za1s-65ue-nqdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61303?format=json","vulnerability_id":"VCID-zeyg-dbfj-93eg","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0829","reference_id":"","reference_type":"","scores":[{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84359","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84291","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84304","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84326","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84352","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84371","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84363","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0829"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195620","reference_id":"1195620","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829","reference_id":"CVE-2015-0829","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-17","reference_id":"mfsa2015-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-17"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0829"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zeyg-dbfj-93eg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56707?format=json","vulnerability_id":"VCID-zrvg-5xgk-cqc3","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1514.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1514.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1514","reference_id":"","reference_type":"","scores":[{"value":"0.04165","scoring_system":"epss","scoring_elements":"0.8869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04165","scoring_system":"epss","scoring_elements":"0.88634","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04165","scoring_system":"epss","scoring_elements":"0.88643","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04165","scoring_system":"epss","scoring_elements":"0.88659","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04165","scoring_system":"epss","scoring_elements":"0.8866","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04165","scoring_system":"epss","scoring_elements":"0.88678","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04165","scoring_system":"epss","scoring_elements":"0.88684","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04165","scoring_system":"epss","scoring_elements":"0.88696","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04165","scoring_system":"epss","scoring_elements":"0.88689","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077494","reference_id":"1077494","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077494"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-32","reference_id":"mfsa2014-32","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0310","reference_id":"RHSA-2014:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0316","reference_id":"RHSA-2014:0316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0316"},{"reference_url":"https://usn.ubuntu.com/2150-1/","reference_id":"USN-2150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2150-1/"},{"reference_url":"https://usn.ubuntu.com/2151-1/","reference_id":"USN-2151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2151-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2014-1514"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zrvg-5xgk-cqc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61305?format=json","vulnerability_id":"VCID-zxvq-vk4c-ebd9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0832","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30665","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30663","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30796","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30662","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3072","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30752","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30756","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30711","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0832"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195610","reference_id":"1195610","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832","reference_id":"CVE-2015-0832","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-13","reference_id":"mfsa2015-13","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-13"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85540?format=json","purl":"pkg:ebuild/www-client/seamonkey@2.33.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.33.1"},{"url":"http://public2.vulnerablecode.io/api/packages/85541?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85542?format=json","purl":"pkg:ebuild/www-client/seamonkey@31.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}],"aliases":["CVE-2015-0832"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zxvq-vk4c-ebd9"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@31.5.3"}