{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","type":"mozilla","namespace":"","name":"Firefox","version":"36.0.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"36.0.3","latest_non_vulnerable_version":"150.0.3","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59586?format=json","vulnerability_id":"VCID-45ek-y9nx-j3cd","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0831.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0831","reference_id":"","reference_type":"","scores":[{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83903","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83688","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83715","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83718","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83759","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83754","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83789","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.8379","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83814","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83823","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.8385","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83871","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83888","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02019","scoring_system":"epss","scoring_elements":"0.83887","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195619","reference_id":"1195619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195619"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-16","reference_id":"mfsa2015-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0265","reference_id":"RHSA-2015:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0266","reference_id":"RHSA-2015:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0629","reference_id":"RHSA-2015:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0642","reference_id":"RHSA-2015:0642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0642"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"},{"reference_url":"https://usn.ubuntu.com/2506-1/","reference_id":"USN-2506-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2506-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0831"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45ek-y9nx-j3cd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61301?format=json","vulnerability_id":"VCID-4dvq-ta2c-s7fp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0826.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0826.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0826","reference_id":"","reference_type":"","scores":[{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72063","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71898","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71906","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71924","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71897","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71971","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71954","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71978","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71982","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71967","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72012","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72019","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72018","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.7201","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72043","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72073","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72036","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0826"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195629","reference_id":"1195629","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826","reference_id":"CVE-2015-0826","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-20","reference_id":"mfsa2015-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-20"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0826"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4dvq-ta2c-s7fp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61297?format=json","vulnerability_id":"VCID-5z4v-hqea-eucx","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0821.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0821.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0821","reference_id":"","reference_type":"","scores":[{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80148","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.79955","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.79963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.79984","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.79973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80001","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.8001","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.8003","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80014","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80006","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80034","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80036","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80063","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80068","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80084","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80097","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80119","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80134","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80132","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0821"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195639","reference_id":"1195639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821","reference_id":"CVE-2015-0821","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-25","reference_id":"mfsa2015-25","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-25"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0821"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5z4v-hqea-eucx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61298?format=json","vulnerability_id":"VCID-664r-gx3z-d7c6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0823.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0823","reference_id":"","reference_type":"","scores":[{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82479","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82261","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82294","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82288","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82315","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82322","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82342","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82336","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82331","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82368","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82389","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.824","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82404","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82423","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82444","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82465","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01709","scoring_system":"epss","scoring_elements":"0.82463","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0823"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195636","reference_id":"1195636","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0823","reference_id":"CVE-2015-0823","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0823"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-23","reference_id":"mfsa2015-23","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-23"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0823"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-664r-gx3z-d7c6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61307?format=json","vulnerability_id":"VCID-9e6r-hnyd-6ufr","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0834.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0834","reference_id":"","reference_type":"","scores":[{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66705","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66501","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.6654","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66566","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66586","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66606","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66573","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66609","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66627","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66637","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66651","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.6665","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66669","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66712","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66685","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0834"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195616","reference_id":"1195616","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834","reference_id":"CVE-2015-0834","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-15","reference_id":"mfsa2015-15","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-15"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0834"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9e6r-hnyd-6ufr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61299?format=json","vulnerability_id":"VCID-ba82-rgap-z7ck","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0824.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0824.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0824","reference_id":"","reference_type":"","scores":[{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81781","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81562","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81573","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81594","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81592","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.8162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81645","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81663","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81666","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.8169","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81699","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81703","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.8172","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81742","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81766","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81764","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0824"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195633","reference_id":"1195633","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824","reference_id":"CVE-2015-0824","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-22","reference_id":"mfsa2015-22","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-22"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0824"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ba82-rgap-z7ck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61295?format=json","vulnerability_id":"VCID-crfx-bba1-97b6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0819.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0819.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0819","reference_id":"","reference_type":"","scores":[{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75993","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75804","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75808","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.7584","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75819","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75868","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75862","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75899","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75902","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75888","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75926","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75936","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75947","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75955","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75985","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.76008","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195640","reference_id":"1195640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0819","reference_id":"CVE-2015-0819","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0819"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-26","reference_id":"mfsa2015-26","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-26"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0819"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-crfx-bba1-97b6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61300?format=json","vulnerability_id":"VCID-dm6s-ammq-33dp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0825.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0825","reference_id":"","reference_type":"","scores":[{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71338","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71146","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71156","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71191","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71212","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71196","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71242","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71249","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71279","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71287","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.7129","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71275","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71312","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71347","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.7131","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0825"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195631","reference_id":"1195631","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825","reference_id":"CVE-2015-0825","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-21","reference_id":"mfsa2015-21","reference_type":"","scores":[{"value":"medium","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-21"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0825"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dm6s-ammq-33dp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59587?format=json","vulnerability_id":"VCID-ep8z-jvbx-rqcj","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0836","reference_id":"","reference_type":"","scores":[{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81211","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81002","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81035","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81034","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81062","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81068","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81086","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81072","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81065","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81103","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81126","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81134","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81141","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81154","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81175","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81197","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81193","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195605","reference_id":"1195605","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195605"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-11","reference_id":"mfsa2015-11","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0265","reference_id":"RHSA-2015:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0266","reference_id":"RHSA-2015:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0629","reference_id":"RHSA-2015:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0642","reference_id":"RHSA-2015:0642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0642"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"},{"reference_url":"https://usn.ubuntu.com/2506-1/","reference_id":"USN-2506-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2506-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0836"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ep8z-jvbx-rqcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59581?format=json","vulnerability_id":"VCID-jj3q-bub2-y3b2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0822.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0822","reference_id":"","reference_type":"","scores":[{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70601","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70403","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70434","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70413","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70498","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70483","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70468","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70549","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70558","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70531","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70571","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70604","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70573","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195638","reference_id":"1195638","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195638"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-24","reference_id":"mfsa2015-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0265","reference_id":"RHSA-2015:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0266","reference_id":"RHSA-2015:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0629","reference_id":"RHSA-2015:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0642","reference_id":"RHSA-2015:0642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0642"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"},{"reference_url":"https://usn.ubuntu.com/2506-1/","reference_id":"USN-2506-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2506-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0822"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jj3q-bub2-y3b2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59584?format=json","vulnerability_id":"VCID-k69z-4hzh-5yd4","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0827.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0827","reference_id":"","reference_type":"","scores":[{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.77086","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76886","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76893","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76937","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76976","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76955","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76951","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76992","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76994","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.76987","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.77021","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.77028","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.77042","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.77033","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.77062","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.77082","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00997","scoring_system":"epss","scoring_elements":"0.77069","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195623","reference_id":"1195623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195623"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-19","reference_id":"mfsa2015-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0265","reference_id":"RHSA-2015:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0266","reference_id":"RHSA-2015:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0629","reference_id":"RHSA-2015:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0642","reference_id":"RHSA-2015:0642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0642"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"},{"reference_url":"https://usn.ubuntu.com/2506-1/","reference_id":"USN-2506-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2506-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0827"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k69z-4hzh-5yd4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61302?format=json","vulnerability_id":"VCID-r39h-25hq-gbdz","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0828.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0828.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0828","reference_id":"","reference_type":"","scores":[{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80291","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80095","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80139","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80164","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.8014","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.8017","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80171","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80173","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80203","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80212","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80227","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.8024","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80262","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80278","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80274","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0828"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195621","reference_id":"1195621","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828","reference_id":"CVE-2015-0828","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-18","reference_id":"mfsa2015-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-18"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0828"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r39h-25hq-gbdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61296?format=json","vulnerability_id":"VCID-vjt1-8bvw-d7dp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0820","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56721","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56632","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56748","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56725","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5679","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56746","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56686","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56702","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5664","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56698","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820","reference_id":"CVE-2015-0820","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-27","reference_id":"mfsa2015-27","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-27"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0820"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vjt1-8bvw-d7dp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61304?format=json","vulnerability_id":"VCID-w63q-84j6-h7dk","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0830","reference_id":"","reference_type":"","scores":[{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76402","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76192","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76198","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.7623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.7621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76256","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76259","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76255","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.763","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76321","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76329","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76341","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76349","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76379","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76399","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76387","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0830"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195613","reference_id":"1195613","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830","reference_id":"CVE-2015-0830","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-14","reference_id":"mfsa2015-14","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-14"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0830"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w63q-84j6-h7dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61306?format=json","vulnerability_id":"VCID-xqqq-rk53-ubhp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0833","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16086","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16076","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16052","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1608","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16264","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16325","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16123","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16275","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16149","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16083","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16099","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16138","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16025","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15984","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15865","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15976","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833","reference_id":"CVE-2015-0833","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-12","reference_id":"mfsa2015-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-12"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-58","reference_id":"mfsa2015-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-58"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"},{"url":"http://public2.vulnerablecode.io/api/packages/86820?format=json","purl":"pkg:mozilla/Firefox@38.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@38.0.0"}],"aliases":["CVE-2015-0833"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqqq-rk53-ubhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61303?format=json","vulnerability_id":"VCID-zeyg-dbfj-93eg","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0829.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0829","reference_id":"","reference_type":"","scores":[{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84502","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84291","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84304","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84326","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84352","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84371","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84363","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84359","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84381","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84382","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84385","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.8442","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84425","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84444","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.8447","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84486","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84485","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0829"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195620","reference_id":"1195620","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829","reference_id":"CVE-2015-0829","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-17","reference_id":"mfsa2015-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-17"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0829"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zeyg-dbfj-93eg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61305?format=json","vulnerability_id":"VCID-zxvq-vk4c-ebd9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0832.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0832","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30152","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30663","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30796","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30662","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3072","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30752","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30756","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30711","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30665","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30689","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30639","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3046","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30346","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30124","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30193","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30202","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3013","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0832"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195610","reference_id":"1195610","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832","reference_id":"CVE-2015-0832","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-13","reference_id":"mfsa2015-13","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-13"},{"reference_url":"https://usn.ubuntu.com/2505-1/","reference_id":"USN-2505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2505-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86800?format=json","purl":"pkg:mozilla/Firefox@36.0.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}],"aliases":["CVE-2015-0832"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zxvq-vk4c-ebd9"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@36.0.0"}