{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","type":"mozilla","namespace":"","name":"Firefox","version":"48.0.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"49.0.0","latest_non_vulnerable_version":"150.0.3","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48161?format=json","vulnerability_id":"VCID-3465-gq22-3kfy","summary":"Multiple vulnerabilities have been found in Expat, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2824.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2824.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2486","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2486"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0718.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0718.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0718","reference_id":"","reference_type":"","scores":[{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86331","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86105","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86274","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.8627","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86284","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86321","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86115","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86132","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86131","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.8615","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86162","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86176","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86174","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.8617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86187","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86193","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86206","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86215","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86234","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86255","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0718"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1236923","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1236923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472"},{"reference_url":"http://seclists.org/fulldisclosure/2017/Feb/68","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2017/Feb/68"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365"},{"reference_url":"https://source.android.com/security/bulletin/2016-11-01.html","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/2016-11-01.html"},{"reference_url":"https://support.apple.com/HT206903","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT206903"},{"reference_url":"http://support.eset.com/ca6333/","reference_id":"","reference_type":"","scores":[],"url":"http://support.eset.com/ca6333/"},{"reference_url":"https://www.tenable.com/security/tns-2016-20","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-20"},{"reference_url":"http://www.debian.org/security/2016/dsa-3582","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3582"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-68.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-68.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/05/17/12","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/05/17/12"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"reference_url":"http://www.securityfocus.com/bid/90729","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/90729"},{"reference_url":"http://www.securitytracker.com/id/1036348","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036348"},{"reference_url":"http://www.securitytracker.com/id/1036415","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036415"},{"reference_url":"http://www.securitytracker.com/id/1037705","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1037705"},{"reference_url":"http://www.ubuntu.com/usn/USN-2983-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2983-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1296102","reference_id":"1296102","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1296102"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718","reference_id":"CVE-2016-0718","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0718","reference_id":"CVE-2016-0718","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0718"},{"reference_url":"https://security.gentoo.org/glsa/201701-21","reference_id":"GLSA-201701-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-68","reference_id":"mfsa2016-68","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-68"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2824","reference_id":"RHSA-2016:2824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2824"},{"reference_url":"https://usn.ubuntu.com/2983-1/","reference_id":"USN-2983-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2983-1/"},{"reference_url":"https://usn.ubuntu.com/3013-1/","reference_id":"USN-3013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3013-1/"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"},{"reference_url":"https://usn.ubuntu.com/7199-1/","reference_id":"USN-7199-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7199-1/"},{"reference_url":"https://usn.ubuntu.com/USN-5455-1/","reference_id":"USN-USN-5455-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-5455-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-0718"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3465-gq22-3kfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56688?format=json","vulnerability_id":"VCID-7kf6-5a92-hfhk","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5252.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5252.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5252","reference_id":"","reference_type":"","scores":[{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80807","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.81063","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.81002","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80996","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.81015","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.81058","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80816","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80837","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.8086","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80885","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80871","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80863","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80899","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80902","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80903","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80924","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80931","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80942","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.80958","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01462","scoring_system":"epss","scoring_elements":"0.8098","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5252"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1268854","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1268854"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3640","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3640"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-67.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-67.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/92261","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92261"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361979","reference_id":"1361979","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361979"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5252","reference_id":"CVE-2016-5252","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5252"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5252","reference_id":"CVE-2016-5252","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5252"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-67","reference_id":"mfsa2016-67","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-67"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1551","reference_id":"RHSA-2016:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1551"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5252"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7kf6-5a92-hfhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56700?format=json","vulnerability_id":"VCID-8dmy-qa26-rbha","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5258.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5258.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5258","reference_id":"","reference_type":"","scores":[{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78001","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78255","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78175","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78191","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78181","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.782","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78241","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78009","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78038","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78047","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78052","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78078","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78061","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78057","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78092","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78085","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78118","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78124","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78137","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01101","scoring_system":"epss","scoring_elements":"0.78148","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5258"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1279146","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1279146"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3640","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3640"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-72.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-72.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/92258","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92258"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361982","reference_id":"1361982","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361982"},{"reference_url":"https://security.archlinux.org/AVG-935","reference_id":"AVG-935","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-935"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5258","reference_id":"CVE-2016-5258","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5258"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5258","reference_id":"CVE-2016-5258","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5258"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-72","reference_id":"mfsa2016-72","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-72"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1551","reference_id":"RHSA-2016:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1551"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5258"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8dmy-qa26-rbha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56708?format=json","vulnerability_id":"VCID-8xz8-qent-zkav","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5260.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5260.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5260","reference_id":"","reference_type":"","scores":[{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69546","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69816","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.6973","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69756","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69806","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69553","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69604","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.6962","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69643","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69628","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69614","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69653","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69662","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69644","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69696","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69705","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.6971","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69685","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69729","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.6976","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5260"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1280294","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1280294"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-74.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-74.html"},{"reference_url":"http://www.securityfocus.com/bid/92260","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92260"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361985","reference_id":"1361985","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361985"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5260","reference_id":"CVE-2016-5260","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5260"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5260","reference_id":"CVE-2016-5260","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5260"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-74","reference_id":"mfsa2016-74","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-74"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5260"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8xz8-qent-zkav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56680?format=json","vulnerability_id":"VCID-8y7u-dhmg-j3ch","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2838.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2838.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2838","reference_id":"","reference_type":"","scores":[{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74883","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74882","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74912","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78738","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78673","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78668","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78684","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78724","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78505","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78531","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78536","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78562","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78544","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78564","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78563","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.7856","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78592","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.786","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78617","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78634","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78658","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2838"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1279814","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1279814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3640","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3640"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-64.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-64.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/92261","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92261"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361976","reference_id":"1361976","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361976"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2838","reference_id":"CVE-2016-2838","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2838"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2838","reference_id":"CVE-2016-2838","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2838"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-64","reference_id":"mfsa2016-64","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-64"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1551","reference_id":"RHSA-2016:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1551"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-2838"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8y7u-dhmg-j3ch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56712?format=json","vulnerability_id":"VCID-935y-sfuq-qqgh","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5263.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5263.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5263","reference_id":"","reference_type":"","scores":[{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71481","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.7173","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71669","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71635","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71665","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71721","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71489","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71505","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71479","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71519","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71531","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71554","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71539","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71567","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71551","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71601","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71609","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71613","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71599","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71634","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5263"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1276897","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1276897"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3640","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3640"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-78.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-78.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/92258","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92258"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361991","reference_id":"1361991","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361991"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5263","reference_id":"CVE-2016-5263","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5263"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5263","reference_id":"CVE-2016-5263","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5263"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-78","reference_id":"mfsa2016-78","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-78"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1551","reference_id":"RHSA-2016:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1551"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5263"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-935y-sfuq-qqgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56720?format=json","vulnerability_id":"VCID-9fxa-6w88-y3h4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5268.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5268.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5268","reference_id":"","reference_type":"","scores":[{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63248","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63504","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63449","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63414","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63441","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63495","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63352","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63387","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6337","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63367","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63351","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63383","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63397","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5268"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1253673","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1253673"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-83.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-83.html"},{"reference_url":"http://www.securityfocus.com/bid/92260","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92260"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361996","reference_id":"1361996","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361996"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5268","reference_id":"CVE-2016-5268","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5268"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5268","reference_id":"CVE-2016-5268","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5268"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-83","reference_id":"mfsa2016-83","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-83"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5268"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9fxa-6w88-y3h4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56705?format=json","vulnerability_id":"VCID-b4dv-raac-tkf1","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5259.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5259.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5259","reference_id":"","reference_type":"","scores":[{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78434","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78685","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78621","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78617","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78633","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78671","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.7844","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.7847","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78454","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.7848","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78486","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78511","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78492","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78485","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78512","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78508","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78541","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78548","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78564","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78581","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78606","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5259"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1282992","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1282992"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3640","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3640"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-73.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-73.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/92258","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92258"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361984","reference_id":"1361984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361984"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5259","reference_id":"CVE-2016-5259","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5259"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5259","reference_id":"CVE-2016-5259","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5259"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-73","reference_id":"mfsa2016-73","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-73"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1551","reference_id":"RHSA-2016:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1551"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5259"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b4dv-raac-tkf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56716?format=json","vulnerability_id":"VCID-bb61-y349-fqgx","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5266.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5266.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5266","reference_id":"","reference_type":"","scores":[{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62334","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62591","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62549","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62502","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62527","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62581","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62392","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62423","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62389","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62437","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62455","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62474","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62441","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62485","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62491","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62484","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62501","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62497","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62444","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62492","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5266"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1226977","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1226977"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-81.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-81.html"},{"reference_url":"http://www.securityfocus.com/bid/92260","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92260"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361995","reference_id":"1361995","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361995"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5266","reference_id":"CVE-2016-5266","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5266"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5266","reference_id":"CVE-2016-5266","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5266"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-81","reference_id":"mfsa2016-81","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-81"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5266"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bb61-y349-fqgx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56711?format=json","vulnerability_id":"VCID-c2kz-qw3v-eqbz","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5262.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5262.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5262","reference_id":"","reference_type":"","scores":[{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52598","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52767","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52592","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52644","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52653","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52756","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52641","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52668","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52634","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52684","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52679","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52729","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52712","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52697","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52736","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52743","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52728","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52689","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.5265","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5262"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1277475","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1277475"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3640","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3640"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-76.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-76.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/92258","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92258"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361987","reference_id":"1361987","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361987"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5262","reference_id":"CVE-2016-5262","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5262"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5262","reference_id":"CVE-2016-5262","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5262"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-76","reference_id":"mfsa2016-76","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-76"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1551","reference_id":"RHSA-2016:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1551"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5262"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c2kz-qw3v-eqbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56689?format=json","vulnerability_id":"VCID-d9dm-aww1-pfbm","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5253","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18207","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18272","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18081","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1811","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18199","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18423","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18477","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18186","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1827","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18324","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18325","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18278","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18226","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1817","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18181","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18119","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18103","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18065","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17923","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18015","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18118","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5253"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1246944","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1246944"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-69.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-69.html"},{"reference_url":"http://www.securityfocus.com/bid/92260","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92260"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5253","reference_id":"CVE-2016-5253","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5253"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5253","reference_id":"CVE-2016-5253","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:C/A:N"},{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5253"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-69","reference_id":"mfsa2016-69","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-69"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5253"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d9dm-aww1-pfbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56678?format=json","vulnerability_id":"VCID-d9z7-npfz-53a8","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2837.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2837.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2837","reference_id":"","reference_type":"","scores":[{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60463","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60727","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60611","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60668","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60655","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60716","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60539","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60565","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60534","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60583","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.606","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60587","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60628","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60633","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60621","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60606","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60617","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2837"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1274637","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1274637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3640","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3640"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-77.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-77.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/92258","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92258"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-16-673","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-16-673"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361989","reference_id":"1361989","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361989"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2837","reference_id":"CVE-2016-2837","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2837"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2837","reference_id":"CVE-2016-2837","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2837"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-77","reference_id":"mfsa2016-77","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-77"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1551","reference_id":"RHSA-2016:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1551"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-2837"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d9z7-npfz-53a8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56713?format=json","vulnerability_id":"VCID-eh1p-amew-hydf","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5264.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5264.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5264","reference_id":"","reference_type":"","scores":[{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77062","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77334","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77268","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77257","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77273","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.7732","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77068","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77121","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77149","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77123","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77164","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77166","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77192","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77199","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77213","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77218","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77247","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5264"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286183","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286183"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3640","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3640"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-79.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-79.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/92258","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92258"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361992","reference_id":"1361992","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361992"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5264","reference_id":"CVE-2016-5264","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5264"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5264","reference_id":"CVE-2016-5264","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5264"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-79","reference_id":"mfsa2016-79","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-79"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1551","reference_id":"RHSA-2016:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1551"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5264"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eh1p-amew-hydf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56709?format=json","vulnerability_id":"VCID-emmz-dq8m-sfct","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1912.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1912.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5261.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5261.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5261","reference_id":"","reference_type":"","scores":[{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75234","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75161","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75185","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75167","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75176","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75228","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75001","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75004","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75033","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75009","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75043","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75054","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75045","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.7509","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.7508","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75118","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75122","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75126","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75135","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5261"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1287266","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1287266"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2016-86/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2016-86/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3674","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3674"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-75.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-75.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"},{"reference_url":"http://www.securityfocus.com/bid/92260","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92260"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361986","reference_id":"1361986","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361986"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5261","reference_id":"CVE-2016-5261","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5261"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5261","reference_id":"CVE-2016-5261","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5261"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-75","reference_id":"mfsa2016-75","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-75"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-86","reference_id":"mfsa2016-86","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-86"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1912","reference_id":"RHSA-2016:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1912"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5261"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-emmz-dq8m-sfct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56675?format=json","vulnerability_id":"VCID-fqmm-499j-nyc3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2830.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2830","reference_id":"","reference_type":"","scores":[{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68053","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68322","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68258","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68223","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.6825","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.6831","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68094","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68071","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68137","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68162","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68115","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68164","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68146","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68188","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68198","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68202","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68176","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68222","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2830"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1255270","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1255270"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3640","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3640"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-63.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-63.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/92261","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92261"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1342897","reference_id":"1342897","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1342897"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2830","reference_id":"CVE-2016-2830","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2830"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2830","reference_id":"CVE-2016-2830","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2830"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-63","reference_id":"mfsa2016-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-63"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1551","reference_id":"RHSA-2016:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1551"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-2830"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fqmm-499j-nyc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56681?format=json","vulnerability_id":"VCID-gu5n-35b2-a3am","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2839.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2839.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2839","reference_id":"","reference_type":"","scores":[{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73277","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.7323","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73191","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73214","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.7327","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73053","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73074","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73085","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73122","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73102","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73096","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73139","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.7314","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73176","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73189","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73188","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73183","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73209","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2839"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1275339","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1275339"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-65.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-65.html"},{"reference_url":"http://www.securityfocus.com/bid/92261","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92261"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361977","reference_id":"1361977","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361977"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2839","reference_id":"CVE-2016-2839","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2839"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2839","reference_id":"CVE-2016-2839","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2839"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-65","reference_id":"mfsa2016-65","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-65"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-2839"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gu5n-35b2-a3am"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56685?format=json","vulnerability_id":"VCID-k1u4-hqjh-zbc8","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5251.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5251.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5251","reference_id":"","reference_type":"","scores":[{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67816","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.68088","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.68026","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67993","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.68018","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.68075","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.6784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67859","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.6789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67904","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67928","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67915","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67878","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67927","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67908","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67953","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67963","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67968","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67943","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67985","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5251"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1255570","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1255570"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-66.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-66.html"},{"reference_url":"http://www.securityfocus.com/bid/92260","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92260"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361978","reference_id":"1361978","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361978"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5251","reference_id":"CVE-2016-5251","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5251"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5251","reference_id":"CVE-2016-5251","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5251"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-66","reference_id":"mfsa2016-66","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-66"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5251"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k1u4-hqjh-zbc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56692?format=json","vulnerability_id":"VCID-m2vr-a1ee-j7gv","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5255.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5255.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5255","reference_id":"","reference_type":"","scores":[{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.77957","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78214","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78148","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78138","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78157","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.782","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.77964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.77993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.77975","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78001","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78006","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78033","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78015","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78013","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78048","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78047","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78074","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78081","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78094","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78106","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78132","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5255"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1212356","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1212356"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-71.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-71.html"},{"reference_url":"http://www.securityfocus.com/bid/92260","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92260"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361981","reference_id":"1361981","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361981"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5255","reference_id":"CVE-2016-5255","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5255"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5255","reference_id":"CVE-2016-5255","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5255"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-71","reference_id":"mfsa2016-71","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-71"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5255"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m2vr-a1ee-j7gv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56715?format=json","vulnerability_id":"VCID-mnar-hq2z-q7dc","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5265.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5265.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5265","reference_id":"","reference_type":"","scores":[{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49428","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49518","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49452","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.494","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49426","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49496","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49456","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49483","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49491","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49486","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49503","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49475","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49524","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49522","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49493","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49448","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49363","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49423","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5265"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1278013","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1278013"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3640","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3640"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-80.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-80.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/92258","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92258"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361994","reference_id":"1361994","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361994"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5265","reference_id":"CVE-2016-5265","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5265"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5265","reference_id":"CVE-2016-5265","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:N"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5265"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-80","reference_id":"mfsa2016-80","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-80"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1551","reference_id":"RHSA-2016:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1551"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5265"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mnar-hq2z-q7dc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56683?format=json","vulnerability_id":"VCID-qne4-76n5-4yf3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1912.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1912.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5250.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5250.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5250","reference_id":"","reference_type":"","scores":[{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67306","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67155","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67196","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67235","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67208","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67232","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67294","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67052","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67088","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67149","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67154","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67157","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67171","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67151","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67174","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67186","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5250"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1254688","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1254688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2016-86/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2016-86/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2016-88/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2016-88/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3674","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3674"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-84.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-84.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"},{"reference_url":"http://www.securityfocus.com/bid/92260","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92260"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361998","reference_id":"1361998","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361998"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5250","reference_id":"CVE-2016-5250","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5250"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5250","reference_id":"CVE-2016-5250","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5250"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-84","reference_id":"mfsa2016-84","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-84"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-86","reference_id":"mfsa2016-86","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-86"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-88","reference_id":"mfsa2016-88","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-88"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1912","reference_id":"RHSA-2016:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1912"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"},{"reference_url":"https://usn.ubuntu.com/3112-1/","reference_id":"USN-3112-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3112-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5250"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qne4-76n5-4yf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56691?format=json","vulnerability_id":"VCID-sg3s-971c-c3fy","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5254.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5254.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5254","reference_id":"","reference_type":"","scores":[{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81309","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.8156","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81503","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81499","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81517","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81557","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81318","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.8134","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81338","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81367","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81372","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81393","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.8138","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81409","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.8141","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81432","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.8144","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81462","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81482","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5254"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1266963","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1266963"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3640","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3640"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-70.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-70.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/92261","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92261"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361980","reference_id":"1361980","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361980"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5254","reference_id":"CVE-2016-5254","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5254"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5254","reference_id":"CVE-2016-5254","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5254"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-70","reference_id":"mfsa2016-70","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-70"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1551","reference_id":"RHSA-2016:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1551"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5254"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sg3s-971c-c3fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56677?format=json","vulnerability_id":"VCID-wgxa-54sd-rqd6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1551.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1809.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1809.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2836.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2836","reference_id":"","reference_type":"","scores":[{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67304","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67563","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67493","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67464","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67489","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.6755","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.6734","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67363","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67391","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67405","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67425","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67413","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67379","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67415","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67427","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67404","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67424","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67435","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67409","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67454","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2836"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1154923","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1154923"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1249578","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1249578"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1257765","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1257765"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1258079","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1258079"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1268626","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1268626"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1282502","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1282502"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1283823","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1283823"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=822081","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=822081"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3640","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3640"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-62.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-62.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/92261","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92261"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"http://www.ubuntu.com/usn/USN-3044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3044-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361974","reference_id":"1361974","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361974"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836","reference_id":"CVE-2016-2836","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2836","reference_id":"CVE-2016-2836","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2836"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-62","reference_id":"mfsa2016-62","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-62"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1551","reference_id":"RHSA-2016:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1809","reference_id":"RHSA-2016:1809","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1809"},{"reference_url":"https://usn.ubuntu.com/3044-1/","reference_id":"USN-3044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3044-1/"},{"reference_url":"https://usn.ubuntu.com/3073-1/","reference_id":"USN-3073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3073-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-2836"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wgxa-54sd-rqd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56717?format=json","vulnerability_id":"VCID-z86r-71n4-p7aj","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird the worst of which could lead to the execution of arbitrary\n    code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5267","reference_id":"","reference_type":"","scores":[{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58891","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58663","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58784","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58811","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58881","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58768","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58735","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58788","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58813","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58808","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58791","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58759","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58773","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58758","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58725","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58769","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58828","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5267"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1284372","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1284372"},{"reference_url":"http://www.mozilla.org/security/announce/2016/mfsa2016-82.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2016/mfsa2016-82.html"},{"reference_url":"http://www.securityfocus.com/bid/92260","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92260"},{"reference_url":"http://www.securitytracker.com/id/1036508","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036508"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5267","reference_id":"CVE-2016-5267","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5267"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5267","reference_id":"CVE-2016-5267","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5267"},{"reference_url":"https://security.gentoo.org/glsa/201701-15","reference_id":"GLSA-201701-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-82","reference_id":"mfsa2016-82","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2016-82"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86479?format=json","purl":"pkg:mozilla/Firefox@48.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}],"aliases":["CVE-2016-5267"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z86r-71n4-p7aj"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@48.0.0"}