{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","type":"mozilla","namespace":"","name":"Firefox OS","version":"2.5.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63726?format=json","vulnerability_id":"VCID-1a1c-ps4h-9yge","summary":"Shally Li was first to report a race condition\nin the lockscreen of Firefox OS that can be used to bypass the passcode\nlock of a Firefox OS device. Under certain circumstances on a locked\ndevice, the user will be dropped directly to the homescreen instead of\nbeing presented with the passcode input dialog.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8511","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10875","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.106","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10801","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10783","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10826","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1074","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10804","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10657","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10733","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1079","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10772","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10613","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10628","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10754","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10706","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10633","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10592","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1073","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8511"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173284","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173284"},{"reference_url":"http://www.mozilla.org/security/announce/2015/mfsa2015-152.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2015/mfsa2015-152.html"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8511","reference_id":"CVE-2015-8511","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8511"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8511","reference_id":"CVE-2015-8511","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8511"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-152","reference_id":"mfsa2015-152","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-152"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-8511"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1a1c-ps4h-9yge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51660?format=json","vulnerability_id":"VCID-2rn3-ydxb-5ugu","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4477.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4477.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4477","reference_id":"","reference_type":"","scores":[{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86336","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86375","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86386","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86384","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86403","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86413","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.8641","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.8643","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86449","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86468","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86465","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86478","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4477"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252277","reference_id":"1252277","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4477","reference_id":"CVE-2015-4477","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4477"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-81","reference_id":"mfsa2015-81","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-81"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4477"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2rn3-ydxb-5ugu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41252?format=json","vulnerability_id":"VCID-2v2n-95e7-d7gw","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2657.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7210.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7210.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7210","reference_id":"","reference_type":"","scores":[{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82855","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82597","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82802","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82818","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82611","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82626","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82648","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82656","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82674","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82668","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82663","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82702","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82704","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82727","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82736","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82742","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82762","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82783","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82804","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7210"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1218326","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1218326"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222"},{"reference_url":"http://www.debian.org/security/2015/dsa-3422","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3422"},{"reference_url":"http://www.mozilla.org/security/announce/2015/mfsa2015-138.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2015/mfsa2015-138.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/79283","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79283"},{"reference_url":"http://www.securitytracker.com/id/1034426","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034426"},{"reference_url":"http://www.ubuntu.com/usn/USN-2833-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2833-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291585","reference_id":"1291585","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291585"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7210","reference_id":"CVE-2015-7210","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7210"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-138","reference_id":"mfsa2015-138","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2657","reference_id":"RHSA-2015:2657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2657"},{"reference_url":"https://usn.ubuntu.com/2833-1/","reference_id":"USN-2833-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2833-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-7210"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2v2n-95e7-d7gw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63721?format=json","vulnerability_id":"VCID-357y-8gzv-pqcr","summary":"Mozilla fixed a bug in the l10n localization of the default homescreen\napp of Firefox OS reported by security researcher Muneaki\nNishimura. Exploiting this issue requires tricking the user into\nbookmarking a specially crafted web page via the 'Add to home screen'\nfunctionality. As a result, an iframe controlled by the\nattacker would be executed with homescreen privileges, potentially\nleading to further system compromise.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8510","reference_id":"","reference_type":"","scores":[{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53769","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.5361","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53709","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53672","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53697","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53635","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53663","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.5363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53682","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.5368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53729","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53712","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53695","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53733","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53718","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53692","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53658","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53611","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53657","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8510"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190038","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190038"},{"reference_url":"http://www.mozilla.org/security/announce/2015/mfsa2015-153.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2015/mfsa2015-153.html"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8510","reference_id":"CVE-2015-8510","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8510"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8510","reference_id":"CVE-2015-8510","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8510"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-153","reference_id":"mfsa2015-153","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-153"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-8510"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-357y-8gzv-pqcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41243?format=json","vulnerability_id":"VCID-6f4h-mcwj-nkd6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2657.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7201.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7201.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7201","reference_id":"","reference_type":"","scores":[{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81739","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81479","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81682","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81699","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.8149","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81537","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81542","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81562","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.8155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81543","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.8158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81582","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81586","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81608","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81616","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81621","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81637","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81659","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01575","scoring_system":"epss","scoring_elements":"0.81683","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7201"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1203135","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1203135"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1224100","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1224100"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1225250","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1225250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222"},{"reference_url":"http://www.debian.org/security/2015/dsa-3422","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3422"},{"reference_url":"http://www.debian.org/security/2016/dsa-3432","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3432"},{"reference_url":"http://www.mozilla.org/security/announce/2015/mfsa2015-134.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2015/mfsa2015-134.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/79279","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79279"},{"reference_url":"http://www.securitytracker.com/id/1034426","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034426"},{"reference_url":"http://www.ubuntu.com/usn/USN-2833-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2833-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2859-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2859-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291571","reference_id":"1291571","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291571"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7201","reference_id":"CVE-2015-7201","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7201"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-134","reference_id":"mfsa2015-134","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2657","reference_id":"RHSA-2015:2657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0001","reference_id":"RHSA-2016:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0001"},{"reference_url":"https://usn.ubuntu.com/2833-1/","reference_id":"USN-2833-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2833-1/"},{"reference_url":"https://usn.ubuntu.com/2859-1/","reference_id":"USN-2859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2859-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-7201"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6f4h-mcwj-nkd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51657?format=json","vulnerability_id":"VCID-6kac-5ery-wuew","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4473.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4473.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4473","reference_id":"","reference_type":"","scores":[{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87819","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88602","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88491","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88495","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88513","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88518","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88529","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88535","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88528","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88545","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.8855","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88549","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88561","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88577","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88589","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88591","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04754","scoring_system":"epss","scoring_elements":"0.89537","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252271","reference_id":"1252271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252271"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-79","reference_id":"mfsa2015-79","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-79"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1682","reference_id":"RHSA-2015:1682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1682"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"},{"reference_url":"https://usn.ubuntu.com/2712-1/","reference_id":"USN-2712-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2712-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4473"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6kac-5ery-wuew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60744?format=json","vulnerability_id":"VCID-7rmg-2u67-kqf3","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4509.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4509.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4509","reference_id":"","reference_type":"","scores":[{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89721","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89591","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89594","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89607","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.8963","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89637","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89629","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89646","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.8964","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89655","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89659","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89658","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89669","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89686","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89698","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89693","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89703","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265192","reference_id":"1265192","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265192"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-106","reference_id":"mfsa2015-106","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1834","reference_id":"RHSA-2015:1834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1852","reference_id":"RHSA-2015:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1852"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"},{"reference_url":"https://usn.ubuntu.com/2754-1/","reference_id":"USN-2754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2754-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4509"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7rmg-2u67-kqf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60740?format=json","vulnerability_id":"VCID-88kb-em1q-77gc","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4500.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4500.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4500","reference_id":"","reference_type":"","scores":[{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.87082","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86901","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.8692","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86913","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86955","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.8695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86959","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86963","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86961","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86985","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86987","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.87008","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.87024","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.87042","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.87037","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.87051","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265186","reference_id":"1265186","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265186"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-96","reference_id":"mfsa2015-96","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-96"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1834","reference_id":"RHSA-2015:1834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1852","reference_id":"RHSA-2015:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1852"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"},{"reference_url":"https://usn.ubuntu.com/2754-1/","reference_id":"USN-2754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2754-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4500"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-88kb-em1q-77gc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63729?format=json","vulnerability_id":"VCID-9p7y-4cfe-ffag","summary":"Security researcher Spandan Veggalam reported a crash while using the\ndebugger API with SavedStacks in JavaScript. This crash can only occurs when the debugger is in use but may be potentially exploitable.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4507.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4507.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4507","reference_id":"","reference_type":"","scores":[{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79106","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78878","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78884","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78894","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78925","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78949","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78934","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78953","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78951","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78986","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79018","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79039","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79053","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79052","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79068","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4507"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265621","reference_id":"1265621","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507","reference_id":"CVE-2015-4507","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-102","reference_id":"mfsa2015-102","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-102"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4507"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9p7y-4cfe-ffag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41249?format=json","vulnerability_id":"VCID-h6wt-azn4-mqfn","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2657.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7205.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7205.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7205","reference_id":"","reference_type":"","scores":[{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75258","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75027","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75195","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75204","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.7503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75059","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75035","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75069","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75081","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75103","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75082","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75071","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75109","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75116","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75144","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75148","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75152","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75161","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75189","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75213","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7205"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1220493","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1220493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222"},{"reference_url":"http://www.debian.org/security/2015/dsa-3422","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3422"},{"reference_url":"http://www.debian.org/security/2016/dsa-3432","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3432"},{"reference_url":"http://www.mozilla.org/security/announce/2015/mfsa2015-145.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2015/mfsa2015-145.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/79279","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79279"},{"reference_url":"http://www.securitytracker.com/id/1034426","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034426"},{"reference_url":"http://www.ubuntu.com/usn/USN-2833-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2833-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2859-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2859-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291595","reference_id":"1291595","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291595"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7205","reference_id":"CVE-2015-7205","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7205"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-145","reference_id":"mfsa2015-145","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2657","reference_id":"RHSA-2015:2657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0001","reference_id":"RHSA-2016:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0001"},{"reference_url":"https://usn.ubuntu.com/2833-1/","reference_id":"USN-2833-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2833-1/"},{"reference_url":"https://usn.ubuntu.com/2859-1/","reference_id":"USN-2859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2859-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-7205"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h6wt-azn4-mqfn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63727?format=json","vulnerability_id":"VCID-kare-ffhq-93dc","summary":"Security researcher André Bargull reported that when a web page\ncreates a scripted proxy for the window with a handler defined a certain way, a reference\nto the inner window will be passed, rather than that of the outer window in violation of\nthe specification.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4502.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4502","reference_id":"","reference_type":"","scores":[{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73767","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73546","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73578","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.7355","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73586","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73622","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73604","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73596","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.7364","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73649","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73673","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73682","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73676","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73701","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73725","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73686","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73709","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4502"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265771","reference_id":"1265771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265771"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4502","reference_id":"CVE-2015-4502","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4502"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-108","reference_id":"mfsa2015-108","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-108"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4502"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kare-ffhq-93dc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41234?format=json","vulnerability_id":"VCID-kuqd-a9t3-vyam","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1982.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1982.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2519.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2519.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7193.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7193.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7193","reference_id":"","reference_type":"","scores":[{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79649","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79412","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79598","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79611","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79419","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79442","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79429","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79457","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79461","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79491","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79489","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79493","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79525","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79531","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79546","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79561","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79583","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79601","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7193"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1210302","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1210302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200"},{"reference_url":"http://www.debian.org/security/2015/dsa-3393","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3393"},{"reference_url":"http://www.debian.org/security/2015/dsa-3410","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3410"},{"reference_url":"http://www.mozilla.org/security/announce/2015/mfsa2015-127.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2015/mfsa2015-127.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77411","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77411"},{"reference_url":"http://www.securitytracker.com/id/1034069","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034069"},{"reference_url":"http://www.ubuntu.com/usn/USN-2785-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2785-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2819-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2819-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277346","reference_id":"1277346","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277346"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7193","reference_id":"CVE-2015-7193","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7193"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-127","reference_id":"mfsa2015-127","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1982","reference_id":"RHSA-2015:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2519","reference_id":"RHSA-2015:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2519"},{"reference_url":"https://usn.ubuntu.com/2785-1/","reference_id":"USN-2785-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2785-1/"},{"reference_url":"https://usn.ubuntu.com/2819-1/","reference_id":"USN-2819-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2819-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-7193"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kuqd-a9t3-vyam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51679?format=json","vulnerability_id":"VCID-nega-51gt-hqfd","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4482","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25584","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25797","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25857","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.259","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25671","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2579","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.258","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25759","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.257","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25703","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25686","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25662","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25605","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25547","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25437","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25503","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25565","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25488","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25505","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4482","reference_id":"CVE-2015-4482","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4482"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-85","reference_id":"mfsa2015-85","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-85"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4482"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nega-51gt-hqfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41257?format=json","vulnerability_id":"VCID-pbzg-cqa6-yba5","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2657.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2657.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7214.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7214.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7214","reference_id":"","reference_type":"","scores":[{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94728","published_at":"2026-05-14T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94623","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.9471","published_at":"2026-05-11T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94715","published_at":"2026-05-12T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.9463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94636","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94638","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94648","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94652","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94657","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.9466","published_at":"2026-04-12T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94661","published_at":"2026-04-13T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94669","published_at":"2026-04-16T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94677","published_at":"2026-04-24T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94678","published_at":"2026-04-26T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94679","published_at":"2026-04-29T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94686","published_at":"2026-05-05T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94694","published_at":"2026-05-07T12:55:00Z"},{"value":"0.15477","scoring_system":"epss","scoring_elements":"0.94704","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7214"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1228950","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1228950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222"},{"reference_url":"http://www.debian.org/security/2015/dsa-3422","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3422"},{"reference_url":"http://www.debian.org/security/2016/dsa-3432","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3432"},{"reference_url":"http://www.mozilla.org/security/announce/2015/mfsa2015-149.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2015/mfsa2015-149.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/79279","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79279"},{"reference_url":"http://www.securitytracker.com/id/1034426","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034426"},{"reference_url":"http://www.ubuntu.com/usn/USN-2833-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2833-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2859-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2859-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291600","reference_id":"1291600","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291600"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7214","reference_id":"CVE-2015-7214","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7214"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-149","reference_id":"mfsa2015-149","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2657","reference_id":"RHSA-2015:2657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0001","reference_id":"RHSA-2016:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0001"},{"reference_url":"https://usn.ubuntu.com/2833-1/","reference_id":"USN-2833-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2833-1/"},{"reference_url":"https://usn.ubuntu.com/2859-1/","reference_id":"USN-2859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2859-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-7214"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pbzg-cqa6-yba5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51691?format=json","vulnerability_id":"VCID-s76d-pjvk-63cr","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4485.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4485.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4485","reference_id":"","reference_type":"","scores":[{"value":"0.06105","scoring_system":"epss","scoring_elements":"0.90877","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.9181","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91818","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91855","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91856","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91852","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91867","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91866","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.9187","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91879","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91891","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91901","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.919","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91908","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91871","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4485"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252292","reference_id":"1252292","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485","reference_id":"CVE-2015-4485","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-89","reference_id":"mfsa2015-89","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-89"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4485"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s76d-pjvk-63cr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60750?format=json","vulnerability_id":"VCID-sz8x-vmck-6yc5","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4519.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4519.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4519","reference_id":"","reference_type":"","scores":[{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63153","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62954","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62983","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63015","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63019","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62996","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63054","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63009","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63055","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63108","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63069","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63097","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265778","reference_id":"1265778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265778"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-110","reference_id":"mfsa2015-110","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1834","reference_id":"RHSA-2015:1834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1852","reference_id":"RHSA-2015:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1852"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"},{"reference_url":"https://usn.ubuntu.com/2754-1/","reference_id":"USN-2754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2754-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4519"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sz8x-vmck-6yc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51711?format=json","vulnerability_id":"VCID-teza-m5kj-s7ac","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4492.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4492","reference_id":"","reference_type":"","scores":[{"value":"0.01947","scoring_system":"epss","scoring_elements":"0.83641","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84677","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84712","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84714","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84743","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84761","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84757","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84774","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84772","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84798","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84808","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84824","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.8485","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84867","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84862","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84877","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84773","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252295","reference_id":"1252295","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252295"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-92","reference_id":"mfsa2015-92","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-92"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4492"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-teza-m5kj-s7ac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51694?format=json","vulnerability_id":"VCID-tsmv-w2tb-hyht","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4487","reference_id":"","reference_type":"","scores":[{"value":"0.02262","scoring_system":"epss","scoring_elements":"0.84785","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85754","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.8581","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.8582","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85835","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85832","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85828","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85868","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85877","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85878","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85897","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85918","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85935","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85934","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85947","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85851","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252293","reference_id":"1252293","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252293"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-90","reference_id":"mfsa2015-90","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-90"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1682","reference_id":"RHSA-2015:1682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1682"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"},{"reference_url":"https://usn.ubuntu.com/2712-1/","reference_id":"USN-2712-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2712-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86743?format=json","purl":"pkg:mozilla/Firefox%20OS@2.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4487"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tsmv-w2tb-hyht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51659?format=json","vulnerability_id":"VCID-ueke-9crt-qybh","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4475.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4475.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4475","reference_id":"","reference_type":"","scores":[{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77748","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.7926","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79277","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79312","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79335","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79308","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79333","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79365","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.7937","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79386","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79395","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79417","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79436","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79455","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79331","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252276","reference_id":"1252276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252276"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-80","reference_id":"mfsa2015-80","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-80"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4475"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ueke-9crt-qybh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41261?format=json","vulnerability_id":"VCID-v213-2wvj-effu","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7218.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7218","reference_id":"","reference_type":"","scores":[{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79589","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79352","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79537","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79552","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79359","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79381","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79367","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79394","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79403","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79426","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.7941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79399","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79429","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79433","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79472","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79487","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79502","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79522","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01259","scoring_system":"epss","scoring_elements":"0.79539","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7218"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1194818","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1194818"},{"reference_url":"http://www.mozilla.org/security/announce/2015/mfsa2015-142.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2015/mfsa2015-142.html"},{"reference_url":"http://www.securityfocus.com/bid/79280","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79280"},{"reference_url":"http://www.securitytracker.com/id/1034426","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034426"},{"reference_url":"http://www.ubuntu.com/usn/USN-2833-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2833-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291590","reference_id":"1291590","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291590"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7218","reference_id":"CVE-2015-7218","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7218"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7218","reference_id":"CVE-2015-7218","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7218"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-142","reference_id":"mfsa2015-142","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-142"},{"reference_url":"https://usn.ubuntu.com/2833-1/","reference_id":"USN-2833-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2833-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-7218"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v213-2wvj-effu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60749?format=json","vulnerability_id":"VCID-vs2t-gwzk-6ubt","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4517.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4517.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4517","reference_id":"","reference_type":"","scores":[{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87151","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.86961","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.86972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.86991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.86984","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87004","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87011","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87025","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87019","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87013","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87029","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87033","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.8703","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.8705","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87055","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87057","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87076","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87092","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87109","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87104","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87119","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265784","reference_id":"1265784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265784"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-112","reference_id":"mfsa2015-112","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1834","reference_id":"RHSA-2015:1834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1852","reference_id":"RHSA-2015:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1852"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"},{"reference_url":"https://usn.ubuntu.com/2754-1/","reference_id":"USN-2754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2754-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4517"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vs2t-gwzk-6ubt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60751?format=json","vulnerability_id":"VCID-y4jx-5cgd-kbbp","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4520.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4520.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4520","reference_id":"","reference_type":"","scores":[{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69417","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69164","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.6918","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.692","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69232","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.6925","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69258","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69229","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69268","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69277","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69257","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69308","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69315","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69323","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69301","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69343","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69378","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69347","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69371","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265781","reference_id":"1265781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265781"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-111","reference_id":"mfsa2015-111","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1834","reference_id":"RHSA-2015:1834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1852","reference_id":"RHSA-2015:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1852"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"},{"reference_url":"https://usn.ubuntu.com/2754-1/","reference_id":"USN-2754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2754-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4520"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y4jx-5cgd-kbbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41218?format=json","vulnerability_id":"VCID-zhyg-avrd-z7gu","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1982.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1982.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2519.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2519.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4513.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4513","reference_id":"","reference_type":"","scores":[{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83916","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83664","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83866","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83882","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83677","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83692","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83694","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83718","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83725","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83741","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83734","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.8373","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83764","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83789","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83797","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83805","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83828","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.8385","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4513"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1107011","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1107011"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1191942","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1191942"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1193038","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1193038"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1204580","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1204580"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1204669","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1204669"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1204700","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1204700"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1205707","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1205707"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1206564","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1206564"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208665","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208665"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1209471","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1209471"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1213979","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1213979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200"},{"reference_url":"http://www.debian.org/security/2015/dsa-3393","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3393"},{"reference_url":"http://www.debian.org/security/2015/dsa-3410","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3410"},{"reference_url":"http://www.mozilla.org/security/announce/2015/mfsa2015-116.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2015/mfsa2015-116.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77411","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77411"},{"reference_url":"http://www.securitytracker.com/id/1034069","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034069"},{"reference_url":"http://www.ubuntu.com/usn/USN-2785-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2785-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2819-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2819-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277332","reference_id":"1277332","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277332"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4513","reference_id":"CVE-2015-4513","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4513"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-116","reference_id":"mfsa2015-116","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-116"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1982","reference_id":"RHSA-2015:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2519","reference_id":"RHSA-2015:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2519"},{"reference_url":"https://usn.ubuntu.com/2785-1/","reference_id":"USN-2785-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2785-1/"},{"reference_url":"https://usn.ubuntu.com/2819-1/","reference_id":"USN-2819-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2819-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-4513"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zhyg-avrd-z7gu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63741?format=json","vulnerability_id":"VCID-zzg5-jcyr-xycc","summary":"Frederik Braun of Mozilla discovered a bug in the\nlockscreen state logic that allows an attacker to bypass the lockscreen\ndelay. The delay was introduced to make it harder to brute-force the\npasscode lock of a Firefox OS device when an attacker has gained physical\naccess. A successful attack would render that tar-pitting mechanism\nineffective.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8512","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22153","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22193","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22079","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22047","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2207","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22396","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22264","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22338","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22297","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22238","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22242","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22237","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2219","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22048","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22035","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21925","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21999","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8512"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1181571","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1181571"},{"reference_url":"http://www.mozilla.org/security/announce/2015/mfsa2015-151.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2015/mfsa2015-151.html"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8512","reference_id":"CVE-2015-8512","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8512"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8512","reference_id":"CVE-2015-8512","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8512"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-151","reference_id":"mfsa2015-151","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-151"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86796?format=json","purl":"pkg:mozilla/Firefox%20OS@2.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}],"aliases":["CVE-2015-8512"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zzg5-jcyr-xycc"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520OS@2.5.0"}