{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","type":"mozilla","namespace":"","name":"Firefox OS","version":"2.2.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.5.0","latest_non_vulnerable_version":"2.5.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59586?format=json","vulnerability_id":"VCID-45ek-y9nx-j3cd","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0831","reference_id":"","reference_type":"","scores":[{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83871","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83688","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83715","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83718","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83759","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83754","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83789","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.8379","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83814","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83823","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.8385","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195619","reference_id":"1195619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195619"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-16","reference_id":"mfsa2015-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0265","reference_id":"RHSA-2015:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0266","reference_id":"RHSA-2015:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0629","reference_id":"RHSA-2015:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0642","reference_id":"RHSA-2015:0642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0642"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"},{"reference_url":"https://usn.ubuntu.com/2506-1/","reference_id":"USN-2506-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2506-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0831"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45ek-y9nx-j3cd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57039?format=json","vulnerability_id":"VCID-4vhr-24e3-d3d2","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1593.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1593.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1593","reference_id":"","reference_type":"","scores":[{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84214","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84038","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84169","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84189","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84068","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84069","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84099","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84117","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.8411","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84106","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84128","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.8413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84134","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84158","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0211","scoring_system":"epss","scoring_elements":"0.84164","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1593"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1085175","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1085175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"http://www.debian.org/security/2014/dsa-3090","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3090"},{"reference_url":"http://www.debian.org/security/2014/dsa-3092","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3092"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-88.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-88.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/71395","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71395"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169209","reference_id":"1169209","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169209"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1593","reference_id":"CVE-2014-1593","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1593"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-88","reference_id":"mfsa2014-88","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-88"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1919","reference_id":"RHSA-2014:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1924","reference_id":"RHSA-2014:1924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1924"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"},{"reference_url":"https://usn.ubuntu.com/2428-1/","reference_id":"USN-2428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-1593"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4vhr-24e3-d3d2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51641?format=json","vulnerability_id":"VCID-51hn-ab8w-c7bn","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2713","reference_id":"","reference_type":"","scores":[{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82677","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.8249","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82519","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82545","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82552","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82564","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82595","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82599","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.8262","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.8263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82636","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82656","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220605","reference_id":"1220605","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220605"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-51","reference_id":"mfsa2015-51","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-51"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0988","reference_id":"RHSA-2015:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1012","reference_id":"RHSA-2015:1012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1012"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"},{"reference_url":"https://usn.ubuntu.com/2603-1/","reference_id":"USN-2603-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2603-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2713"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-51hn-ab8w-c7bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41000?format=json","vulnerability_id":"VCID-55jd-xx14-d3h3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0802","reference_id":"","reference_type":"","scores":[{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99137","published_at":"2026-05-07T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99115","published_at":"2026-04-01T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99116","published_at":"2026-04-02T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99122","published_at":"2026-04-07T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99125","published_at":"2026-04-16T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99126","published_at":"2026-04-18T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99128","published_at":"2026-04-21T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99132","published_at":"2026-04-24T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99135","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0802"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207086","reference_id":"1207086","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802","reference_id":"CVE-2015-0802","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb","reference_id":"CVE-2015-0816;CVE-2015-0802;OSVDB-120107;OSVDB-119753","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-42","reference_id":"mfsa2015-42","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-42"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0802"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-55jd-xx14-d3h3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51649?format=json","vulnerability_id":"VCID-55t4-7jnq-j7fx","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2716","reference_id":"","reference_type":"","scores":[{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90381","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90283","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90286","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90303","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90318","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90325","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90332","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90326","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90342","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90339","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90354","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90353","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.9035","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90364","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220607","reference_id":"1220607","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220607"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-54","reference_id":"mfsa2015-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-54"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0988","reference_id":"RHSA-2015:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1012","reference_id":"RHSA-2015:1012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1011","reference_id":"RHSA-2020:1011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2508","reference_id":"RHSA-2020:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2508"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"},{"reference_url":"https://usn.ubuntu.com/2603-1/","reference_id":"USN-2603-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2603-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2716"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-55t4-7jnq-j7fx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57038?format=json","vulnerability_id":"VCID-63hm-xmht-g3cp","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1592.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1592","reference_id":"","reference_type":"","scores":[{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82757","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82569","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82717","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82736","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82599","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82595","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82621","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82629","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82647","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82675","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.82678","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.827","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01768","scoring_system":"epss","scoring_elements":"0.8271","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1592"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088635","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"http://www.debian.org/security/2014/dsa-3090","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3090"},{"reference_url":"http://www.debian.org/security/2014/dsa-3092","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3092"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-87.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-87.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/71398","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71398"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169208","reference_id":"1169208","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169208"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1592","reference_id":"CVE-2014-1592","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1592"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-87","reference_id":"mfsa2014-87","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-87"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1919","reference_id":"RHSA-2014:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1924","reference_id":"RHSA-2014:1924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1924"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"},{"reference_url":"https://usn.ubuntu.com/2428-1/","reference_id":"USN-2428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-1592"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-63hm-xmht-g3cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41214?format=json","vulnerability_id":"VCID-7yp8-9btm-zqgn","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2743.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2743.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2743","reference_id":"","reference_type":"","scores":[{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.77897","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.7771","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.77717","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.77744","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.77727","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.77755","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.7776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.77786","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.7777","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.77806","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.77805","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.77799","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.77832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.7784","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.77854","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01074","scoring_system":"epss","scoring_elements":"0.77866","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236964","reference_id":"1236964","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236964"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-69","reference_id":"mfsa2015-69","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-69"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2743"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7yp8-9btm-zqgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41112?format=json","vulnerability_id":"VCID-82k6-qk5e-cuag","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2729","reference_id":"","reference_type":"","scores":[{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61553","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61402","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61507","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61477","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61524","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61539","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61561","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61548","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61527","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61569","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61573","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61557","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.6156","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61504","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2729"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236952","reference_id":"1236952","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729","reference_id":"CVE-2015-2729","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-62","reference_id":"mfsa2015-62","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-62"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2729"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-82k6-qk5e-cuag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51651?format=json","vulnerability_id":"VCID-89pc-vcy3-tkd7","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2718","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30271","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30739","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30865","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30911","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30821","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30822","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30778","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30733","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30538","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30422","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30339","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30201","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2718"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220609","reference_id":"1220609","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718","reference_id":"CVE-2015-2718","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-56","reference_id":"mfsa2015-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-56"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2718"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-89pc-vcy3-tkd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57035?format=json","vulnerability_id":"VCID-8s1b-yh8y-cbdk","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1587.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1587.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1587","reference_id":"","reference_type":"","scores":[{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82072","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.8189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82034","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82052","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81901","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81924","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.8192","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81947","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81954","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81974","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81963","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81958","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81993","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81995","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82029","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1587"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1042567","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1042567"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1072847","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1072847"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1079729","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1079729"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080312","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080312"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1089207","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1089207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"http://www.debian.org/security/2014/dsa-3090","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3090"},{"reference_url":"http://www.debian.org/security/2014/dsa-3092","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3092"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-83.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-83.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/71391","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71391"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169201","reference_id":"1169201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169201"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1587","reference_id":"CVE-2014-1587","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1587"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-83","reference_id":"mfsa2014-83","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-83"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1919","reference_id":"RHSA-2014:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1924","reference_id":"RHSA-2014:1924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1924"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"},{"reference_url":"https://usn.ubuntu.com/2428-1/","reference_id":"USN-2428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-1587"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8s1b-yh8y-cbdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58189?format=json","vulnerability_id":"VCID-9bat-kqxd-gkg2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8634.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8634.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8634","reference_id":"","reference_type":"","scores":[{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82665","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82474","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82502","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82529","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82536","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82555","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.8255","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82545","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82582","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82586","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82608","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82618","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82624","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01748","scoring_system":"epss","scoring_elements":"0.82644","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180962","reference_id":"1180962","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180962"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-01","reference_id":"mfsa2015-01","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0046","reference_id":"RHSA-2015:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0047","reference_id":"RHSA-2015:0047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0047"},{"reference_url":"https://usn.ubuntu.com/2458-1/","reference_id":"USN-2458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2458-1/"},{"reference_url":"https://usn.ubuntu.com/2460-1/","reference_id":"USN-2460-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2460-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-8634"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9bat-kqxd-gkg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61307?format=json","vulnerability_id":"VCID-9e6r-hnyd-6ufr","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0834","reference_id":"","reference_type":"","scores":[{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66669","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66501","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.6654","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66566","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66586","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66606","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66573","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66609","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66627","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66637","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66651","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.6665","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66624","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0834"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195616","reference_id":"1195616","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834","reference_id":"CVE-2015-0834","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-15","reference_id":"mfsa2015-15","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-15"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0834"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9e6r-hnyd-6ufr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56970?format=json","vulnerability_id":"VCID-cjda-dm64-kqg2","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1574.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1574.json"},{"reference_url":"https://advisories.mageia.org/MGASA-2014-0421.html","reference_id":"","reference_type":"","scores":[],"url":"https://advisories.mageia.org/MGASA-2014-0421.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1574","reference_id":"","reference_type":"","scores":[{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.82079","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.82041","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.82059","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81908","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.8193","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81927","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.8198","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81964","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.81999","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.82001","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.82024","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01644","scoring_system":"epss","scoring_elements":"0.82035","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1574"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011354","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011354"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1061214","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1061214"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1061600","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1061600"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1064346","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1064346"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1072044","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1072044"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1072174","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1072174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586"},{"reference_url":"http://secunia.com/advisories/61387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61387"},{"reference_url":"http://secunia.com/advisories/61854","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61854"},{"reference_url":"http://secunia.com/advisories/62021","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62021"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.debian.org/security/2014/dsa-3050","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3050"},{"reference_url":"http://www.debian.org/security/2014/dsa-3061","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3061"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-74.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-74.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/70436","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70436"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.securitytracker.com/id/1031030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031030"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2373-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2373-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152356","reference_id":"1152356","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152356"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1574","reference_id":"CVE-2014-1574","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1574"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-74","reference_id":"mfsa2014-74","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-74"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1635","reference_id":"RHSA-2014:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1647","reference_id":"RHSA-2014:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1647"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"},{"reference_url":"https://usn.ubuntu.com/2373-1/","reference_id":"USN-2373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-1574"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cjda-dm64-kqg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63733?format=json","vulnerability_id":"VCID-ct72-956e-qyef","summary":"Paul Theriault of Mozilla discovered a privacy issue with a WiFi-related system\nmessage that wasn't properly restricted to apps with the \"wifi-manage\" permission. As a result,\neven unprivileged apps could have received those messages, allowing them to extract limited\ninformation from a vulnerable Firefox OS device under certain rare conditions.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4494","reference_id":"","reference_type":"","scores":[{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49614","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49617","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49646","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49626","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49681","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49675","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49693","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49664","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49714","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49683","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49673","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49639","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49555","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4494","reference_id":"CVE-2015-4494","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4494"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-76","reference_id":"mfsa2015-76","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-76"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-4494"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ct72-956e-qyef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61300?format=json","vulnerability_id":"VCID-dm6s-ammq-33dp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0825","reference_id":"","reference_type":"","scores":[{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71312","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71146","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71156","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71191","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71212","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71196","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71242","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71249","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71279","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71287","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.7129","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71275","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0825"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195631","reference_id":"1195631","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825","reference_id":"CVE-2015-0825","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-21","reference_id":"mfsa2015-21","reference_type":"","scores":[{"value":"medium","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-21"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0825"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dm6s-ammq-33dp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63715?format=json","vulnerability_id":"VCID-duj8-zd4h-u7at","summary":"Security researcher Muneaki Nishimura reported an issue with Gaia's System app\nwhich allows an attacker to inject HTML code into the System app's context via specially-crafted\nsearch links. The injection occurs when the user opens such malicious link in the browser and then\npresses the HOME button or uses the Show Windows function.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2745","reference_id":"","reference_type":"","scores":[{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55205","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55136","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55237","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.5526","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55239","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55289","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.5529","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55301","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55281","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55262","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55304","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55283","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.5522","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.5524","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55161","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2745","reference_id":"CVE-2015-2745","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2745"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-73","reference_id":"mfsa2015-73","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-73"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2745"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-duj8-zd4h-u7at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41005?format=json","vulnerability_id":"VCID-e193-1kgh-5kda","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0805","reference_id":"","reference_type":"","scores":[{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82258","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82076","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82158","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82181","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82207","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82218","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82236","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0805"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207078","reference_id":"1207078","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805","reference_id":"CVE-2015-0805","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-38","reference_id":"mfsa2015-38","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-38"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0805"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e193-1kgh-5kda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57041?format=json","vulnerability_id":"VCID-e1ef-b4f7-7yd8","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1594.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1594","reference_id":"","reference_type":"","scores":[{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82367","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82183","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82328","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82346","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82213","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82239","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82247","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82259","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.8229","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82289","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82291","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82312","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01693","scoring_system":"epss","scoring_elements":"0.82323","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1594"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1074280","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1074280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"http://www.debian.org/security/2014/dsa-3090","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3090"},{"reference_url":"http://www.debian.org/security/2014/dsa-3092","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3092"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-89.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-89.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/71396","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71396"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169210","reference_id":"1169210","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169210"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1594","reference_id":"CVE-2014-1594","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1594"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-89","reference_id":"mfsa2014-89","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-89"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1919","reference_id":"RHSA-2014:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1924","reference_id":"RHSA-2014:1924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1924"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"},{"reference_url":"https://usn.ubuntu.com/2428-1/","reference_id":"USN-2428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-1594"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e1ef-b4f7-7yd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59587?format=json","vulnerability_id":"VCID-ep8z-jvbx-rqcj","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0836","reference_id":"","reference_type":"","scores":[{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81175","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81002","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81035","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81034","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81062","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81068","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81086","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81072","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81065","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81103","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81126","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81134","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81141","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81154","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195605","reference_id":"1195605","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195605"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-11","reference_id":"mfsa2015-11","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0265","reference_id":"RHSA-2015:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0266","reference_id":"RHSA-2015:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0629","reference_id":"RHSA-2015:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0642","reference_id":"RHSA-2015:0642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0642"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"},{"reference_url":"https://usn.ubuntu.com/2506-1/","reference_id":"USN-2506-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2506-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0836"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ep8z-jvbx-rqcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58191?format=json","vulnerability_id":"VCID-f1nz-g5h1-m7dm","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8638.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8638","reference_id":"","reference_type":"","scores":[{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65877","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65713","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65763","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65758","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65811","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65822","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65828","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65798","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65832","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65834","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65856","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.6583","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180966","reference_id":"1180966","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180966"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-03","reference_id":"mfsa2015-03","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0046","reference_id":"RHSA-2015:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0047","reference_id":"RHSA-2015:0047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0047"},{"reference_url":"https://usn.ubuntu.com/2458-1/","reference_id":"USN-2458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2458-1/"},{"reference_url":"https://usn.ubuntu.com/2460-1/","reference_id":"USN-2460-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2460-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-8638"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f1nz-g5h1-m7dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41217?format=json","vulnerability_id":"VCID-fasa-11uc-jucq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4495.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4495.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4495","reference_id":"","reference_type":"","scores":[{"value":"0.71568","scoring_system":"epss","scoring_elements":"0.98747","published_at":"2026-05-07T12:55:00Z"},{"value":"0.71568","scoring_system":"epss","scoring_elements":"0.98718","published_at":"2026-04-01T12:55:00Z"},{"value":"0.71568","scoring_system":"epss","scoring_elements":"0.98719","published_at":"2026-04-02T12:55:00Z"},{"value":"0.71568","scoring_system":"epss","scoring_elements":"0.98723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.71568","scoring_system":"epss","scoring_elements":"0.98727","published_at":"2026-04-09T12:55:00Z"},{"value":"0.71568","scoring_system":"epss","scoring_elements":"0.9873","published_at":"2026-04-12T12:55:00Z"},{"value":"0.71568","scoring_system":"epss","scoring_elements":"0.98731","published_at":"2026-04-13T12:55:00Z"},{"value":"0.71568","scoring_system":"epss","scoring_elements":"0.98733","published_at":"2026-04-16T12:55:00Z"},{"value":"0.71568","scoring_system":"epss","scoring_elements":"0.98734","published_at":"2026-04-21T12:55:00Z"},{"value":"0.71568","scoring_system":"epss","scoring_elements":"0.98739","published_at":"2026-04-26T12:55:00Z"},{"value":"0.71568","scoring_system":"epss","scoring_elements":"0.9874","published_at":"2026-04-29T12:55:00Z"},{"value":"0.71568","scoring_system":"epss","scoring_elements":"0.98745","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4495"},{"reference_url":"http://www.securitytracker.com/id/1033216","reference_id":"1033216","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"http://www.securitytracker.com/id/1033216"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1251318","reference_id":"1251318","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1251318"},{"reference_url":"https://www.exploit-db.com/exploits/37772/","reference_id":"37772","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"https://www.exploit-db.com/exploits/37772/"},{"reference_url":"http://www.securityfocus.com/bid/76249","reference_id":"76249","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"http://www.securityfocus.com/bid/76249"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495","reference_id":"CVE-2015-4495","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/37772.js","reference_id":"CVE-2015-4495;OSVDB-125839","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/37772.js"},{"reference_url":"https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/","reference_id":"firefox-exploit-found-in-the-wild","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-78","reference_id":"mfsa2015-78","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-78"},{"reference_url":"http://www.mozilla.org/security/announce/2015/mfsa2015-78.html","reference_id":"mfsa2015-78.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"http://www.mozilla.org/security/announce/2015/mfsa2015-78.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html","reference_id":"msg00009.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html","reference_id":"msg00014.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html","reference_id":"msg00016.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1581","reference_id":"RHSA-2015:1581","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1581"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1581.html","reference_id":"RHSA-2015-1581.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1581.html"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1178058","reference_id":"show_bug.cgi?id=1178058","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1178058"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1179262","reference_id":"show_bug.cgi?id=1179262","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1179262"},{"reference_url":"https://usn.ubuntu.com/2707-1/","reference_id":"USN-2707-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2707-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-2707-1","reference_id":"USN-2707-1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/"}],"url":"http://www.ubuntu.com/usn/USN-2707-1"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-4495"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fasa-11uc-jucq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40999?format=json","vulnerability_id":"VCID-ffrc-3bx6-jbav","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0801","reference_id":"","reference_type":"","scores":[{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78955","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78802","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78815","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.7884","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.7887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78853","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78843","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78872","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78869","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78867","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78895","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78902","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78934","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207084","reference_id":"1207084","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207084"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-40","reference_id":"mfsa2015-40","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-40"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0766","reference_id":"RHSA-2015:0766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0771","reference_id":"RHSA-2015:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0771"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"},{"reference_url":"https://usn.ubuntu.com/2552-1/","reference_id":"USN-2552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0801"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ffrc-3bx6-jbav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51628?format=json","vulnerability_id":"VCID-ghtc-dh9g-2ufb","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2708","reference_id":"","reference_type":"","scores":[{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.80051","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79885","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79892","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79901","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79938","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79958","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79934","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79962","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79965","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.80015","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.80028","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220597","reference_id":"1220597","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220597"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-46","reference_id":"mfsa2015-46","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-46"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0988","reference_id":"RHSA-2015:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1012","reference_id":"RHSA-2015:1012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1012"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"},{"reference_url":"https://usn.ubuntu.com/2603-1/","reference_id":"USN-2603-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2603-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2708"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ghtc-dh9g-2ufb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41053?format=json","vulnerability_id":"VCID-gr7k-2v4p-kbfg","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0816","reference_id":"","reference_type":"","scores":[{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.9937","published_at":"2026-05-07T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99359","published_at":"2026-04-02T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99361","published_at":"2026-04-04T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99363","published_at":"2026-04-08T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99364","published_at":"2026-04-09T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99366","published_at":"2026-04-13T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99368","published_at":"2026-04-18T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99369","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207072","reference_id":"1207072","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207072"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-33","reference_id":"mfsa2015-33","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0766","reference_id":"RHSA-2015:0766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0771","reference_id":"RHSA-2015:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0771"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"},{"reference_url":"https://usn.ubuntu.com/2552-1/","reference_id":"USN-2552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0816"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gr7k-2v4p-kbfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41045?format=json","vulnerability_id":"VCID-grdt-g3kf-3uh3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0815","reference_id":"","reference_type":"","scores":[{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79486","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79314","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.7933","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79356","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79389","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79373","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79394","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79392","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79395","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79428","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79433","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79449","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79464","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207068","reference_id":"1207068","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207068"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-30","reference_id":"mfsa2015-30","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0766","reference_id":"RHSA-2015:0766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0771","reference_id":"RHSA-2015:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0771"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"},{"reference_url":"https://usn.ubuntu.com/2552-1/","reference_id":"USN-2552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0815"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-grdt-g3kf-3uh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61292?format=json","vulnerability_id":"VCID-gx4v-yve4-gbga","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8640.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8640","reference_id":"","reference_type":"","scores":[{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.78359","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.78366","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.78397","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.7838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.78407","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.78412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0114","scoring_system":"epss","scoring_elements":"0.78438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01542","scoring_system":"epss","scoring_elements":"0.81463","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01542","scoring_system":"epss","scoring_elements":"0.81483","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01542","scoring_system":"epss","scoring_elements":"0.81381","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01542","scoring_system":"epss","scoring_elements":"0.81374","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01542","scoring_system":"epss","scoring_elements":"0.81411","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01542","scoring_system":"epss","scoring_elements":"0.81433","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01542","scoring_system":"epss","scoring_elements":"0.81441","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01542","scoring_system":"epss","scoring_elements":"0.81446","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180970","reference_id":"1180970","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640","reference_id":"CVE-2014-8640","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-05","reference_id":"mfsa2015-05","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-05"},{"reference_url":"https://usn.ubuntu.com/2458-1/","reference_id":"USN-2458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2458-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-8640"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gx4v-yve4-gbga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56976?format=json","vulnerability_id":"VCID-hb1k-vzww-8bbm","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1581.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1581.json"},{"reference_url":"https://advisories.mageia.org/MGASA-2014-0421.html","reference_id":"","reference_type":"","scores":[],"url":"https://advisories.mageia.org/MGASA-2014-0421.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1581","reference_id":"","reference_type":"","scores":[{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84851","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84678","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84809","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84825","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84715","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84737","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84744","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84774","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84773","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.848","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1581"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1068218","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1068218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586"},{"reference_url":"http://secunia.com/advisories/61387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61387"},{"reference_url":"http://secunia.com/advisories/61854","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61854"},{"reference_url":"http://secunia.com/advisories/62021","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62021"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.debian.org/security/2014/dsa-3050","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3050"},{"reference_url":"http://www.debian.org/security/2014/dsa-3061","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3061"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-79.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-79.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/70426","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70426"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.securitytracker.com/id/1031030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031030"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2373-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2373-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152363","reference_id":"1152363","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152363"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1581","reference_id":"CVE-2014-1581","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1581"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-79","reference_id":"mfsa2014-79","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-79"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1635","reference_id":"RHSA-2014:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1647","reference_id":"RHSA-2014:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1647"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"},{"reference_url":"https://usn.ubuntu.com/2373-1/","reference_id":"USN-2373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-1581"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hb1k-vzww-8bbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59581?format=json","vulnerability_id":"VCID-jj3q-bub2-y3b2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0822","reference_id":"","reference_type":"","scores":[{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70571","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70403","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70434","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70413","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70498","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70483","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70468","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70549","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70558","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70531","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195638","reference_id":"1195638","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195638"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-24","reference_id":"mfsa2015-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0265","reference_id":"RHSA-2015:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0266","reference_id":"RHSA-2015:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0629","reference_id":"RHSA-2015:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0642","reference_id":"RHSA-2015:0642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0642"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"},{"reference_url":"https://usn.ubuntu.com/2506-1/","reference_id":"USN-2506-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2506-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0822"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jj3q-bub2-y3b2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41122?format=json","vulnerability_id":"VCID-jmhk-12t1-kugh","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2730","reference_id":"","reference_type":"","scores":[{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4535","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45514","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45536","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45482","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45537","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45538","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45558","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45527","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45581","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45578","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45529","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45443","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45452","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45286","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236954","reference_id":"1236954","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236954"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-64","reference_id":"mfsa2015-64","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-64"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1664","reference_id":"RHSA-2015:1664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1699","reference_id":"RHSA-2015:1699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1699"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2672-1/","reference_id":"USN-2672-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2672-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2730"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jmhk-12t1-kugh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41010?format=json","vulnerability_id":"VCID-jnj4-g593-37d7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0811","reference_id":"","reference_type":"","scores":[{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73541","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73385","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73394","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73389","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73426","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.7344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73463","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73443","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73478","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73487","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.7348","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73513","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73525","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73523","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73516","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0811"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207073","reference_id":"1207073","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811","reference_id":"CVE-2015-0811","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-34","reference_id":"mfsa2015-34","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-34"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0811"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jnj4-g593-37d7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59584?format=json","vulnerability_id":"VCID-k69z-4hzh-5yd4","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0827","reference_id":"","reference_type":"","scores":[{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.77062","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76886","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76893","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76937","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76976","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76955","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76951","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76992","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76994","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76987","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.77021","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.77028","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.77042","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.77033","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195623","reference_id":"1195623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195623"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-19","reference_id":"mfsa2015-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0265","reference_id":"RHSA-2015:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0266","reference_id":"RHSA-2015:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0629","reference_id":"RHSA-2015:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0642","reference_id":"RHSA-2015:0642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0642"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"},{"reference_url":"https://usn.ubuntu.com/2506-1/","reference_id":"USN-2506-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2506-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0827"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k69z-4hzh-5yd4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41161?format=json","vulnerability_id":"VCID-kyhs-j9aj-vqft","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2734","reference_id":"","reference_type":"","scores":[{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79451","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79293","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7931","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79343","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79421","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79429","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956","reference_id":"1236956","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66","reference_id":"mfsa2015-66","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2734"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kyhs-j9aj-vqft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41090?format=json","vulnerability_id":"VCID-mwyu-5rk2-xbbz","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2721","reference_id":"","reference_type":"","scores":[{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.6979","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69606","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69619","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69635","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69665","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69682","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69704","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69689","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69725","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69706","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69758","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69767","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69772","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69746","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236967","reference_id":"1236967","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236967"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://security.gentoo.org/glsa/201701-46","reference_id":"GLSA-201701-46","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-46"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-71","reference_id":"mfsa2015-71","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-71"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1185","reference_id":"RHSA-2015:1185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1664","reference_id":"RHSA-2015:1664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1664"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2672-1/","reference_id":"USN-2672-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2672-1/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2721"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mwyu-5rk2-xbbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51648?format=json","vulnerability_id":"VCID-nav6-hsaf-2fbj","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2715","reference_id":"","reference_type":"","scores":[{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80399","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80224","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80252","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.8024","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80297","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80282","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80275","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80306","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80311","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80337","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80343","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80361","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80376","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2715"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220606","reference_id":"1220606","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715","reference_id":"CVE-2015-2715","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-53","reference_id":"mfsa2015-53","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-53"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2715"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nav6-hsaf-2fbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56966?format=json","vulnerability_id":"VCID-qdev-8m9n-8bbr","summary":"security update","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html"},{"reference_url":"http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1307.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1307.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1354.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1354.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1371.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1371.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1568.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1568","reference_id":"","reference_type":"","scores":[{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96766","published_at":"2026-05-07T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96749","published_at":"2026-04-24T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96763","published_at":"2026-05-05T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96718","published_at":"2026-04-04T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96722","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.9673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96731","published_at":"2026-04-09T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96734","published_at":"2026-04-12T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96737","published_at":"2026-04-13T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96743","published_at":"2026-04-16T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.96747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.30935","scoring_system":"epss","scoring_elements":"0.9675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.34437","scoring_system":"epss","scoring_elements":"0.96962","published_at":"2026-04-01T12:55:00Z"},{"value":"0.34437","scoring_system":"epss","scoring_elements":"0.9697","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1568"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1064636","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1064636"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1069405","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1069405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568"},{"reference_url":"http://secunia.com/advisories/61540","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61540"},{"reference_url":"http://secunia.com/advisories/61574","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61574"},{"reference_url":"http://secunia.com/advisories/61575","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61575"},{"reference_url":"http://secunia.com/advisories/61576","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61576"},{"reference_url":"http://secunia.com/advisories/61583","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61583"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/96194","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/96194"},{"reference_url":"http://www.debian.org/security/2014/dsa-3033","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3033"},{"reference_url":"http://www.debian.org/security/2014/dsa-3034","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3034"},{"reference_url":"http://www.debian.org/security/2014/dsa-3037","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3037"},{"reference_url":"http://www.kb.cert.org/vuls/id/772676","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/772676"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-73.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-73.html"},{"reference_url":"http://www.novell.com/support/kb/doc.php?id=7015701","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/support/kb/doc.php?id=7015701"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/70116","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70116"},{"reference_url":"http://www.ubuntu.com/usn/USN-2360-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2360-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2360-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2360-2"},{"reference_url":"http://www.ubuntu.com/usn/USN-2361-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2361-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1145429","reference_id":"1145429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1145429"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.102:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.21:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.22:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.23:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.24:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.25:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.26:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1568","reference_id":"CVE-2014-1568","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1568"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-73","reference_id":"mfsa2014-73","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-73"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1307","reference_id":"RHSA-2014:1307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1354","reference_id":"RHSA-2014:1354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1371","reference_id":"RHSA-2014:1371","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1371"},{"reference_url":"https://usn.ubuntu.com/2360-1/","reference_id":"USN-2360-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2360-1/"},{"reference_url":"https://usn.ubuntu.com/2360-2/","reference_id":"USN-2360-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2360-2/"},{"reference_url":"https://usn.ubuntu.com/2361-1/","reference_id":"USN-2361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2361-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-1568"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdev-8m9n-8bbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41094?format=json","vulnerability_id":"VCID-qj59-9xmk-7yg9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2722","reference_id":"","reference_type":"","scores":[{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84873","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84701","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84736","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84738","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.8476","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84785","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.8478","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84774","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84796","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84797","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84795","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84832","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84831","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84847","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236955","reference_id":"1236955","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236955"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722","reference_id":"CVE-2015-2722","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-65","reference_id":"mfsa2015-65","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-65"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2722"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qj59-9xmk-7yg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61277?format=json","vulnerability_id":"VCID-qpzb-b3nx-m3cv","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1591.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1591.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1591","reference_id":"","reference_type":"","scores":[{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50575","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.5057","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50598","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50522","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50649","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50604","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50659","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50655","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50698","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.5066","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50707","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50686","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50634","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50642","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1591"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1069762","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1069762"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-86.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-86.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169207","reference_id":"1169207","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169207"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591","reference_id":"CVE-2014-1591","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1591","reference_id":"CVE-2014-1591","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1591"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-86","reference_id":"mfsa2014-86","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-86"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-1591"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qpzb-b3nx-m3cv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56973?format=json","vulnerability_id":"VCID-r56k-pzrk-kfbb","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1635.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1647.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1577.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1577.json"},{"reference_url":"https://advisories.mageia.org/MGASA-2014-0421.html","reference_id":"","reference_type":"","scores":[],"url":"https://advisories.mageia.org/MGASA-2014-0421.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1577","reference_id":"","reference_type":"","scores":[{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79757","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79581","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79718","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79734","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79588","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79611","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79598","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79634","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79655","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79632","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79662","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79666","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79696","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79703","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1577"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1012609","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1012609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586"},{"reference_url":"http://secunia.com/advisories/61387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61387"},{"reference_url":"http://secunia.com/advisories/61854","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61854"},{"reference_url":"http://secunia.com/advisories/62021","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62021"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.debian.org/security/2014/dsa-3050","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3050"},{"reference_url":"http://www.debian.org/security/2014/dsa-3061","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3061"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-76.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-76.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/70440","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70440"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.securitytracker.com/id/1031030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031030"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2373-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2373-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152359","reference_id":"1152359","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152359"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1577","reference_id":"CVE-2014-1577","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1577"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-76","reference_id":"mfsa2014-76","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-76"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1635","reference_id":"RHSA-2014:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1647","reference_id":"RHSA-2014:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1647"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"},{"reference_url":"https://usn.ubuntu.com/2373-1/","reference_id":"USN-2373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-1577"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r56k-pzrk-kfbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51650?format=json","vulnerability_id":"VCID-r7v8-qp3e-cua2","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2717","reference_id":"","reference_type":"","scores":[{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.8522","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85058","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85071","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85093","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85121","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85136","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85133","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.8513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85151","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85154","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85152","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85184","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85181","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85195","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220608","reference_id":"1220608","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717","reference_id":"CVE-2015-2717","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-55","reference_id":"mfsa2015-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-55"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2717"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7v8-qp3e-cua2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58197?format=json","vulnerability_id":"VCID-r8f9-h598-7bg5","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8641.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8641.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8641","reference_id":"","reference_type":"","scores":[{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81368","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81197","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81205","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81228","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81268","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.8126","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81297","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81298","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.8132","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81327","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81332","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81349","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180973","reference_id":"1180973","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180973"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-06","reference_id":"mfsa2015-06","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0046","reference_id":"RHSA-2015:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0046"},{"reference_url":"https://usn.ubuntu.com/2458-1/","reference_id":"USN-2458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2458-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-8641"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r8f9-h598-7bg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34739?format=json","vulnerability_id":"VCID-rzqy-gheq-cqgg","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4000","reference_id":"","reference_type":"","scores":[{"value":"0.93743","scoring_system":"epss","scoring_elements":"0.99852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.93743","scoring_system":"epss","scoring_elements":"0.99855","published_at":"2026-05-07T12:55:00Z"},{"value":"0.93743","scoring_system":"epss","scoring_elements":"0.99854","published_at":"2026-05-05T12:55:00Z"},{"value":"0.93743","scoring_system":"epss","scoring_elements":"0.99853","published_at":"2026-04-24T12:55:00Z"},{"value":"0.93743","scoring_system":"epss","scoring_elements":"0.99851","published_at":"2026-04-07T12:55:00Z"},{"value":"0.93894","scoring_system":"epss","scoring_elements":"0.99876","published_at":"2026-04-09T12:55:00Z"},{"value":"0.93894","scoring_system":"epss","scoring_elements":"0.99875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99873","published_at":"2026-04-01T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99877","published_at":"2026-04-18T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99875","published_at":"2026-04-12T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99874","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1223211","reference_id":"1223211","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1223211"},{"reference_url":"https://security.gentoo.org/glsa/201506-02","reference_id":"GLSA-201506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201506-02"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://security.gentoo.org/glsa/201701-46","reference_id":"GLSA-201701-46","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-46"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-70","reference_id":"mfsa2015-70","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-70"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1072","reference_id":"RHSA-2015:1072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1185","reference_id":"RHSA-2015:1185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1197","reference_id":"RHSA-2015:1197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2056","reference_id":"RHSA-2016:2056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2056"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-4000"],"risk_score":7.2,"exploitability":"2.0","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqy-gheq-cqgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51694?format=json","vulnerability_id":"VCID-tsmv-w2tb-hyht","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4487","reference_id":"","reference_type":"","scores":[{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85918","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85754","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.8581","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.8582","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85835","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85832","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85828","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85851","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85868","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85877","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85878","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85897","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252293","reference_id":"1252293","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252293"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-90","reference_id":"mfsa2015-90","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-90"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1682","reference_id":"RHSA-2015:1682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1682"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"},{"reference_url":"https://usn.ubuntu.com/2712-1/","reference_id":"USN-2712-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2712-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4487"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tsmv-w2tb-hyht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57036?format=json","vulnerability_id":"VCID-vhpz-366r-hbg1","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1590.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1590.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1590","reference_id":"","reference_type":"","scores":[{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.7733","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77147","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77296","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77302","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77154","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77183","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77198","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77206","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77234","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77213","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77249","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77251","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77276","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01019","scoring_system":"epss","scoring_elements":"0.77281","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1590"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1087633","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1087633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"http://www.debian.org/security/2014/dsa-3090","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3090"},{"reference_url":"http://www.debian.org/security/2014/dsa-3092","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3092"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-85.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-85.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/71397","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71397"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169206","reference_id":"1169206","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169206"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1590","reference_id":"CVE-2014-1590","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1590"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-85","reference_id":"mfsa2014-85","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-85"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1919","reference_id":"RHSA-2014:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1924","reference_id":"RHSA-2014:1924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1924"},{"reference_url":"https://usn.ubuntu.com/2424-1/","reference_id":"USN-2424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2424-1/"},{"reference_url":"https://usn.ubuntu.com/2428-1/","reference_id":"USN-2428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-1590"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vhpz-366r-hbg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61304?format=json","vulnerability_id":"VCID-w63q-84j6-h7dk","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0830","reference_id":"","reference_type":"","scores":[{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76379","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76192","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76198","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.7623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.7621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76256","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76259","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76255","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.763","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76321","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76329","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76341","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76349","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0830"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195613","reference_id":"1195613","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830","reference_id":"CVE-2015-0830","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-14","reference_id":"mfsa2015-14","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-14"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0830"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w63q-84j6-h7dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41095?format=json","vulnerability_id":"VCID-xjf8-mc7t-hfah","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2724","reference_id":"","reference_type":"","scores":[{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75978","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75798","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75802","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75813","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75881","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75855","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75893","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75896","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75882","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75919","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75929","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.7594","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75948","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236947","reference_id":"1236947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236947"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-59","reference_id":"mfsa2015-59","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-59"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2724"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xjf8-mc7t-hfah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41109?format=json","vulnerability_id":"VCID-xqxf-cnpj-3qas","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2728","reference_id":"","reference_type":"","scores":[{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77876","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.7769","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77697","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.7774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77751","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.7775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77786","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77785","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77778","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.7782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77834","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77846","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236951","reference_id":"1236951","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236951"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-61","reference_id":"mfsa2015-61","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-61"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2728"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqxf-cnpj-3qas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61266?format=json","vulnerability_id":"VCID-xs3q-48t9-1qgn","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1580.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1580.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1580","reference_id":"","reference_type":"","scores":[{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63974","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63818","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63959","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63958","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63906","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63863","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63914","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63931","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.6393","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63897","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63932","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63942","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63948","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1580"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1063733","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1063733"},{"reference_url":"http://secunia.com/advisories/62022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62022"},{"reference_url":"http://secunia.com/advisories/62023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62023"},{"reference_url":"http://www.mozilla.org/security/announce/2014/mfsa2014-78.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-78.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/70431","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70431"},{"reference_url":"http://www.securitytracker.com/id/1031028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031028"},{"reference_url":"http://www.ubuntu.com/usn/USN-2372-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2372-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152362","reference_id":"1152362","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152362"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580","reference_id":"CVE-2014-1580","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1580","reference_id":"CVE-2014-1580","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1580"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-78","reference_id":"mfsa2014-78","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2014-78"},{"reference_url":"https://usn.ubuntu.com/2372-1/","reference_id":"USN-2372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2372-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2014-1580"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xs3q-48t9-1qgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51631?format=json","vulnerability_id":"VCID-xx39-5rg1-b3am","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2710","reference_id":"","reference_type":"","scores":[{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85219","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85058","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85071","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85121","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85135","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85133","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.8513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85151","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85154","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85184","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.8518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85194","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220601","reference_id":"1220601","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220601"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-48","reference_id":"mfsa2015-48","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-48"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0988","reference_id":"RHSA-2015:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1012","reference_id":"RHSA-2015:1012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1012"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"},{"reference_url":"https://usn.ubuntu.com/2603-1/","reference_id":"USN-2603-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2603-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2710"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xx39-5rg1-b3am"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41007?format=json","vulnerability_id":"VCID-ys1x-t7un-ayhr","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0807","reference_id":"","reference_type":"","scores":[{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33192","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33485","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33639","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33673","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33512","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.3359","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33584","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33543","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33519","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33554","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33318","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33236","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33125","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207076","reference_id":"1207076","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207076"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-37","reference_id":"mfsa2015-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-37"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0766","reference_id":"RHSA-2015:0766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0771","reference_id":"RHSA-2015:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0771"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"},{"reference_url":"https://usn.ubuntu.com/2552-1/","reference_id":"USN-2552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0807"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ys1x-t7un-ayhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63722?format=json","vulnerability_id":"VCID-zca5-m2yy-zybb","summary":"Security researcher Muneaki Nishimura reported an issue with Gaia's Search app\nwhich allows an attacker to inject HTML code into the System app's context via specially-crafted\nsearch links. The injection occurs when the user opens such malicious link in the browser and then\nre-opens the browser or opens the tab view.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2744","reference_id":"","reference_type":"","scores":[{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49604","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49607","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49616","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49671","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49655","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49702","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.497","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49661","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49629","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49545","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2744","reference_id":"CVE-2015-2744","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2744"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-72","reference_id":"mfsa2015-72","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-72"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-2744"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zca5-m2yy-zybb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61303?format=json","vulnerability_id":"VCID-zeyg-dbfj-93eg","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0829","reference_id":"","reference_type":"","scores":[{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.8447","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84291","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84304","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84326","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84352","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84371","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84363","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84359","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84381","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84382","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84385","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.8442","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84425","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84444","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0829"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195620","reference_id":"1195620","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829","reference_id":"CVE-2015-0829","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-17","reference_id":"mfsa2015-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-17"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0829"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zeyg-dbfj-93eg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61305?format=json","vulnerability_id":"VCID-zxvq-vk4c-ebd9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0832","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30193","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30663","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30796","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30662","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3072","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30752","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30756","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30711","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30665","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30689","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30639","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3046","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30346","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30124","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0832"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195610","reference_id":"1195610","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832","reference_id":"CVE-2015-0832","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-13","reference_id":"mfsa2015-13","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-13"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}],"aliases":["CVE-2015-0832"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zxvq-vk4c-ebd9"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"}