{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","type":"mozilla","namespace":"","name":"SeaMonkey","version":"2.35.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.38.0","latest_non_vulnerable_version":"2.38.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41101?format=json","vulnerability_id":"VCID-1p76-9qmf-bqgm","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2727.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2727.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2727","reference_id":"","reference_type":"","scores":[{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77996","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.7774","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77773","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77757","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.7779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77816","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.778","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77799","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77836","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77835","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77829","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77869","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77883","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77894","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77924","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77942","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77932","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.7795","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2727"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236950","reference_id":"1236950","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727","reference_id":"CVE-2015-2727","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-60","reference_id":"mfsa2015-60","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-60"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2727"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1p76-9qmf-bqgm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51641?format=json","vulnerability_id":"VCID-51hn-ab8w-c7bn","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2713","reference_id":"","reference_type":"","scores":[{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82752","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.8249","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82519","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82545","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82552","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82564","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82595","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82599","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.8262","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.8263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82636","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82656","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82677","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82698","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82697","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01751","scoring_system":"epss","scoring_elements":"0.82712","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220605","reference_id":"1220605","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220605"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-51","reference_id":"mfsa2015-51","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-51"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0988","reference_id":"RHSA-2015:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1012","reference_id":"RHSA-2015:1012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1012"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"},{"reference_url":"https://usn.ubuntu.com/2603-1/","reference_id":"USN-2603-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2603-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2713"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-51hn-ab8w-c7bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41000?format=json","vulnerability_id":"VCID-55jd-xx14-d3h3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0802","reference_id":"","reference_type":"","scores":[{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99139","published_at":"2026-05-14T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99115","published_at":"2026-04-01T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99116","published_at":"2026-04-02T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99122","published_at":"2026-04-07T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99125","published_at":"2026-04-16T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99126","published_at":"2026-04-18T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99128","published_at":"2026-04-21T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99132","published_at":"2026-04-24T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99135","published_at":"2026-05-05T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99137","published_at":"2026-05-09T12:55:00Z"},{"value":"0.80386","scoring_system":"epss","scoring_elements":"0.99138","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0802"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207086","reference_id":"1207086","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802","reference_id":"CVE-2015-0802","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb","reference_id":"CVE-2015-0816;CVE-2015-0802;OSVDB-120107;OSVDB-119753","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-42","reference_id":"mfsa2015-42","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-42"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0802"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-55jd-xx14-d3h3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51649?format=json","vulnerability_id":"VCID-55t4-7jnq-j7fx","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2716","reference_id":"","reference_type":"","scores":[{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90411","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90283","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90286","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90303","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90318","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90325","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90332","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90326","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90342","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90339","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90354","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90353","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.9035","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90364","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90381","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90392","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90389","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05614","scoring_system":"epss","scoring_elements":"0.90398","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220607","reference_id":"1220607","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220607"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-54","reference_id":"mfsa2015-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-54"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0988","reference_id":"RHSA-2015:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1012","reference_id":"RHSA-2015:1012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1011","reference_id":"RHSA-2020:1011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2508","reference_id":"RHSA-2020:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2508"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"},{"reference_url":"https://usn.ubuntu.com/2603-1/","reference_id":"USN-2603-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2603-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2716"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-55t4-7jnq-j7fx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51632?format=json","vulnerability_id":"VCID-5ead-13an-2kcs","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2711.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2711.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2711","reference_id":"","reference_type":"","scores":[{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66977","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66723","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66761","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66787","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66758","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66807","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66822","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66828","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66796","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66829","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66843","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66827","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66852","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66866","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66862","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66832","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66876","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66916","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.6689","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66912","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2711"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220603","reference_id":"1220603","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2711","reference_id":"CVE-2015-2711","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2711"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-49","reference_id":"mfsa2015-49","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-49"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2711"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5ead-13an-2kcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51657?format=json","vulnerability_id":"VCID-6kac-5ery-wuew","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4473.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4473.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4473","reference_id":"","reference_type":"","scores":[{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87819","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88602","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88491","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88495","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88513","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88518","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88529","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88535","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88528","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88545","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.8855","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88549","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88561","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88577","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88589","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04054","scoring_system":"epss","scoring_elements":"0.88591","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04754","scoring_system":"epss","scoring_elements":"0.89537","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252271","reference_id":"1252271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252271"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-79","reference_id":"mfsa2015-79","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-79"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1682","reference_id":"RHSA-2015:1682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1682"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"},{"reference_url":"https://usn.ubuntu.com/2712-1/","reference_id":"USN-2712-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2712-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4473"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6kac-5ery-wuew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40998?format=json","vulnerability_id":"VCID-7gzd-vyba-bfbs","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0799.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0799","reference_id":"","reference_type":"","scores":[{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28603","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29125","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29252","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29063","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29126","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29075","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29104","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29081","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29035","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28915","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28803","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28579","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28639","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28659","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28582","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31088","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1208731","reference_id":"1208731","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1208731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799","reference_id":"CVE-2015-0799","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-44","reference_id":"mfsa2015-44","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-44"},{"reference_url":"https://usn.ubuntu.com/2557-1/","reference_id":"USN-2557-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2557-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0799"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gzd-vyba-bfbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41112?format=json","vulnerability_id":"VCID-82k6-qk5e-cuag","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2729","reference_id":"","reference_type":"","scores":[{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61654","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61402","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61507","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61477","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61524","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61539","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61561","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61548","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61527","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61569","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61573","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61557","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.6156","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61504","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61553","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61612","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61601","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2729"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236952","reference_id":"1236952","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729","reference_id":"CVE-2015-2729","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-62","reference_id":"mfsa2015-62","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-62"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2729"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-82k6-qk5e-cuag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51651?format=json","vulnerability_id":"VCID-89pc-vcy3-tkd7","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2718","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30299","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30739","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30865","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30911","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30821","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30822","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30778","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30733","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30538","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30422","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30339","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30201","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30271","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3028","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30206","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30228","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2718"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220609","reference_id":"1220609","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718","reference_id":"CVE-2015-2718","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-56","reference_id":"mfsa2015-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-56"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2718"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-89pc-vcy3-tkd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41008?format=json","vulnerability_id":"VCID-9n5g-6m3r-3uez","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0808.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0808.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0808","reference_id":"","reference_type":"","scores":[{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72215","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72051","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72058","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72078","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72054","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72092","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72103","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72126","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72111","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72096","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72137","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72145","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72131","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72174","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72183","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72178","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72169","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72199","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72226","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00705","scoring_system":"epss","scoring_elements":"0.72188","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74296","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0808"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207075","reference_id":"1207075","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808","reference_id":"CVE-2015-0808","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-36","reference_id":"mfsa2015-36","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-36"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0808"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9n5g-6m3r-3uez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51706?format=json","vulnerability_id":"VCID-drq5-6jps-skax","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4491","reference_id":"","reference_type":"","scores":[{"value":"0.03692","scoring_system":"epss","scoring_elements":"0.88061","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88815","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88823","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88839","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88841","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88859","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88876","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88884","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88882","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88934","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88943","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88879","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88896","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88902","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88903","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88912","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04296","scoring_system":"epss","scoring_elements":"0.8894","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4491"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252290","reference_id":"1252290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252290"},{"reference_url":"https://security.gentoo.org/glsa/201512-05","reference_id":"GLSA-201512-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-05"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-88","reference_id":"mfsa2015-88","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-88"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1682","reference_id":"RHSA-2015:1682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1694","reference_id":"RHSA-2015:1694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1694"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"},{"reference_url":"https://usn.ubuntu.com/2712-1/","reference_id":"USN-2712-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2712-1/"},{"reference_url":"https://usn.ubuntu.com/2722-1/","reference_id":"USN-2722-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2722-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4491"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drq5-6jps-skax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41005?format=json","vulnerability_id":"VCID-e193-1kgh-5kda","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0805","reference_id":"","reference_type":"","scores":[{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82293","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82076","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82158","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82181","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82207","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82218","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82236","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82258","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.8228","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82277","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83465","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0805"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207078","reference_id":"1207078","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805","reference_id":"CVE-2015-0805","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-38","reference_id":"mfsa2015-38","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-38"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0805"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e193-1kgh-5kda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63740?format=json","vulnerability_id":"VCID-et32-whyj-dyev","summary":"Security researcher Joshua Drake  reported potential integer overflows  in the libstagefright library while processing video sample metadata in MPEG4 video files.   This can lead to a potentially exploitable crash.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4496.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4496.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4496","reference_id":"","reference_type":"","scores":[{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81396","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81149","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81182","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81234","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.8122","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81213","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81249","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81251","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81271","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81279","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81285","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.813","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81319","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81341","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81337","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01513","scoring_system":"epss","scoring_elements":"0.81354","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4496"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1253550","reference_id":"1253550","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1253550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4496","reference_id":"CVE-2015-4496","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4496"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-93","reference_id":"mfsa2015-93","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-93"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0988","reference_id":"RHSA-2015:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0988"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4496"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-et32-whyj-dyev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40999?format=json","vulnerability_id":"VCID-ffrc-3bx6-jbav","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0801","reference_id":"","reference_type":"","scores":[{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.79022","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78802","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78815","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.7884","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.7887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78853","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78843","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78872","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78869","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78867","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78895","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78902","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78934","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78955","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78969","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78966","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01191","scoring_system":"epss","scoring_elements":"0.78983","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207084","reference_id":"1207084","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207084"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-40","reference_id":"mfsa2015-40","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-40"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0766","reference_id":"RHSA-2015:0766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0771","reference_id":"RHSA-2015:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0771"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"},{"reference_url":"https://usn.ubuntu.com/2552-1/","reference_id":"USN-2552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0801"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ffrc-3bx6-jbav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60737?format=json","vulnerability_id":"VCID-fnkt-es29-cuhh","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4498.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4498.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4498","reference_id":"","reference_type":"","scores":[{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68984","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68725","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68764","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68743","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68794","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68813","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68836","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68821","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68792","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68833","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68843","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.6887","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68876","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68882","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68862","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68904","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.6894","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68906","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68931","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1257278","reference_id":"1257278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1257278"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-95","reference_id":"mfsa2015-95","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-95"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1693","reference_id":"RHSA-2015:1693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1693"},{"reference_url":"https://usn.ubuntu.com/2723-1/","reference_id":"USN-2723-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2723-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4498"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fnkt-es29-cuhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51628?format=json","vulnerability_id":"VCID-ghtc-dh9g-2ufb","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2708","reference_id":"","reference_type":"","scores":[{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.80119","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79885","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79892","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79901","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79938","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79958","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79934","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79962","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79965","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.80015","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.80028","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.80051","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.80066","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.80062","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.80078","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220597","reference_id":"1220597","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220597"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-46","reference_id":"mfsa2015-46","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-46"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0988","reference_id":"RHSA-2015:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1012","reference_id":"RHSA-2015:1012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1012"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"},{"reference_url":"https://usn.ubuntu.com/2603-1/","reference_id":"USN-2603-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2603-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2708"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ghtc-dh9g-2ufb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41053?format=json","vulnerability_id":"VCID-gr7k-2v4p-kbfg","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0816","reference_id":"","reference_type":"","scores":[{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99377","published_at":"2026-05-14T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99359","published_at":"2026-04-02T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99361","published_at":"2026-04-04T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99363","published_at":"2026-04-08T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99364","published_at":"2026-04-09T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99366","published_at":"2026-04-13T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99368","published_at":"2026-04-18T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99369","published_at":"2026-05-05T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.9937","published_at":"2026-05-07T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99372","published_at":"2026-05-09T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99373","published_at":"2026-05-11T12:55:00Z"},{"value":"0.8537","scoring_system":"epss","scoring_elements":"0.99375","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207072","reference_id":"1207072","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207072"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-33","reference_id":"mfsa2015-33","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0766","reference_id":"RHSA-2015:0766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0771","reference_id":"RHSA-2015:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0771"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"},{"reference_url":"https://usn.ubuntu.com/2552-1/","reference_id":"USN-2552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0816"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gr7k-2v4p-kbfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41045?format=json","vulnerability_id":"VCID-grdt-g3kf-3uh3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0815","reference_id":"","reference_type":"","scores":[{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79553","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79314","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.7933","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79356","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79389","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79373","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79394","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79392","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79395","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79428","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79433","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79449","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79464","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79486","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79504","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79501","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01254","scoring_system":"epss","scoring_elements":"0.79517","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207068","reference_id":"1207068","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207068"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-30","reference_id":"mfsa2015-30","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0766","reference_id":"RHSA-2015:0766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0771","reference_id":"RHSA-2015:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0771"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"},{"reference_url":"https://usn.ubuntu.com/2552-1/","reference_id":"USN-2552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0815"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-grdt-g3kf-3uh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41122?format=json","vulnerability_id":"VCID-jmhk-12t1-kugh","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2730","reference_id":"","reference_type":"","scores":[{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45412","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45514","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45536","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45482","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45537","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45538","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45558","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45527","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45581","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45578","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45529","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45443","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45452","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45286","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4535","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45369","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45313","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45336","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236954","reference_id":"1236954","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236954"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-64","reference_id":"mfsa2015-64","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-64"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1664","reference_id":"RHSA-2015:1664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1699","reference_id":"RHSA-2015:1699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1699"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2672-1/","reference_id":"USN-2672-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2672-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2730"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jmhk-12t1-kugh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41010?format=json","vulnerability_id":"VCID-jnj4-g593-37d7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0811","reference_id":"","reference_type":"","scores":[{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73547","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73385","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73394","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73389","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73426","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.7344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73463","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73443","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73478","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73487","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.7348","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73513","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73525","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73523","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73516","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73541","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73565","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73524","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00873","scoring_system":"epss","scoring_elements":"0.75425","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0811"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207073","reference_id":"1207073","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811","reference_id":"CVE-2015-0811","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-34","reference_id":"mfsa2015-34","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-34"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0811"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jnj4-g593-37d7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51661?format=json","vulnerability_id":"VCID-jqed-5g3b-auag","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4478.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4478","reference_id":"","reference_type":"","scores":[{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68339","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71081","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.7109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71107","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71082","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71137","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.7116","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71145","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71129","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71182","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71216","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71224","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71228","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71213","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.7125","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71284","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71247","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71275","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00661","scoring_system":"epss","scoring_elements":"0.71175","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252282","reference_id":"1252282","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252282"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-82","reference_id":"mfsa2015-82","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-82"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4478"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqed-5g3b-auag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51674?format=json","vulnerability_id":"VCID-jqq7-zaqr-6bap","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4481","reference_id":"","reference_type":"","scores":[{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36903","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37246","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37412","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37436","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37264","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37315","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37327","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37339","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37277","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37323","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37306","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37252","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37029","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36998","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36913","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36795","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36861","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36881","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36804","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36826","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4481"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=427&can=1","reference_id":"CVE-2015-4481","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=427&can=1"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4481","reference_id":"CVE-2015-4481","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4481"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/37925.txt","reference_id":"CVE-2015-4481","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/37925.txt"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-84","reference_id":"mfsa2015-84","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-84"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4481"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqq7-zaqr-6bap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51635?format=json","vulnerability_id":"VCID-jtxv-vhm6-33h3","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2712.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2712.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2712","reference_id":"","reference_type":"","scores":[{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88358","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88182","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.8819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88206","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88212","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88232","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88242","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88241","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88254","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88272","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88277","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88279","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88291","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88307","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88319","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.88317","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03878","scoring_system":"epss","scoring_elements":"0.8833","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2712"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220604","reference_id":"1220604","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2712","reference_id":"CVE-2015-2712","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2712"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-50","reference_id":"mfsa2015-50","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-50"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2712"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jtxv-vhm6-33h3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41130?format=json","vulnerability_id":"VCID-k6eg-55x2-dyh5","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2731.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2731.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2731","reference_id":"","reference_type":"","scores":[{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76483","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76247","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.7625","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76293","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76334","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76312","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76347","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76337","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.7638","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76381","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.7641","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.7643","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76418","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76434","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236953","reference_id":"1236953","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236953"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-63","reference_id":"mfsa2015-63","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-63"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2731"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k6eg-55x2-dyh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41161?format=json","vulnerability_id":"VCID-kyhs-j9aj-vqft","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2734","reference_id":"","reference_type":"","scores":[{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79525","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79293","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7931","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79343","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79421","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79429","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79451","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79468","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79487","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956","reference_id":"1236956","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236956"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66","reference_id":"mfsa2015-66","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-66"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2734"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kyhs-j9aj-vqft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41090?format=json","vulnerability_id":"VCID-mwyu-5rk2-xbbz","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2721","reference_id":"","reference_type":"","scores":[{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66622","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69606","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69619","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69635","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69665","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69682","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69704","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69689","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69706","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69758","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69767","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69772","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69746","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.6979","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69821","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69791","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69817","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69725","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236967","reference_id":"1236967","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236967"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://security.gentoo.org/glsa/201701-46","reference_id":"GLSA-201701-46","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-46"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-71","reference_id":"mfsa2015-71","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-71"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1185","reference_id":"RHSA-2015:1185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1664","reference_id":"RHSA-2015:1664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1664"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2672-1/","reference_id":"USN-2672-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2672-1/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2721"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mwyu-5rk2-xbbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51648?format=json","vulnerability_id":"VCID-nav6-hsaf-2fbj","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2715","reference_id":"","reference_type":"","scores":[{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.8047","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80224","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80252","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.8024","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80297","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80282","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80275","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80306","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80311","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80337","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80343","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80361","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80376","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80399","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80417","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80412","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80429","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2715"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220606","reference_id":"1220606","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715","reference_id":"CVE-2015-2715","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-53","reference_id":"mfsa2015-53","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-53"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2715"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nav6-hsaf-2fbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51679?format=json","vulnerability_id":"VCID-nega-51gt-hqfd","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4482","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25584","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25797","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25857","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.259","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25671","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2579","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.258","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25759","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.257","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25703","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25686","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25662","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25605","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25547","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25437","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25503","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25565","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25488","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25505","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4482","reference_id":"CVE-2015-4482","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4482"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-85","reference_id":"mfsa2015-85","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-85"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4482"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nega-51gt-hqfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41003?format=json","vulnerability_id":"VCID-p7k1-93e6-cfha","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0803.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0803.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0803","reference_id":"","reference_type":"","scores":[{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82293","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82076","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82158","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82181","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82207","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82218","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82236","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82258","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.8228","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82277","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83465","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0803"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207081","reference_id":"1207081","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803","reference_id":"CVE-2015-0803","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-39","reference_id":"mfsa2015-39","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-39"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0803"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p7k1-93e6-cfha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49155?format=json","vulnerability_id":"VCID-pcxu-acuh-m3be","summary":"A buffer overflow in GStreamer could allow remote attackers to\n    execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0797.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0797","reference_id":"","reference_type":"","scores":[{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91928","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91816","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91825","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91831","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91858","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91861","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91877","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91874","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91872","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91876","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91885","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91897","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91907","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91905","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07609","scoring_system":"epss","scoring_elements":"0.91913","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220600","reference_id":"1220600","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220600"},{"reference_url":"https://security.gentoo.org/glsa/201512-07","reference_id":"GLSA-201512-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-07"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-47","reference_id":"mfsa2015-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0988","reference_id":"RHSA-2015:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0988"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0797"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pcxu-acuh-m3be"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41094?format=json","vulnerability_id":"VCID-qj59-9xmk-7yg9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2722","reference_id":"","reference_type":"","scores":[{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84933","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84701","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84736","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84738","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.8476","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84785","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.8478","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84774","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84796","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84797","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84795","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84832","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84831","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84847","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84873","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.8489","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84885","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02313","scoring_system":"epss","scoring_elements":"0.84901","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236955","reference_id":"1236955","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236955"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722","reference_id":"CVE-2015-2722","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-65","reference_id":"mfsa2015-65","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-65"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2722"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qj59-9xmk-7yg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41064?format=json","vulnerability_id":"VCID-qny5-vvv5-q7f4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2706.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2706.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2706","reference_id":"","reference_type":"","scores":[{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78531","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.7829","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78296","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78327","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78351","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78344","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78373","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78372","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78369","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78403","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.7841","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78427","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.7844","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78481","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78477","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78493","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2706"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213935","reference_id":"1213935","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213935"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706","reference_id":"CVE-2015-2706","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-45","reference_id":"mfsa2015-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-45"},{"reference_url":"https://usn.ubuntu.com/2571-1/","reference_id":"USN-2571-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2571-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2706"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qny5-vvv5-q7f4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54341?format=json","vulnerability_id":"VCID-qynw-zxy1-qqfh","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3079","reference_id":"","reference_type":"","scores":[{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63209","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.62953","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63126","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63154","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63041","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63005","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63072","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63089","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63075","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63053","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63097","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63076","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63111","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.6311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63067","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63114","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63165","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-57","reference_id":"mfsa2015-57","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-57"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2011-3079"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qynw-zxy1-qqfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51650?format=json","vulnerability_id":"VCID-r7v8-qp3e-cua2","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2717","reference_id":"","reference_type":"","scores":[{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85284","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85058","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85071","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85093","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85121","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85136","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85133","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.8513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85151","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85154","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85152","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85184","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85181","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85195","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.8522","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85239","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85234","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85247","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220608","reference_id":"1220608","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717","reference_id":"CVE-2015-2717","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-55","reference_id":"mfsa2015-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-55"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2717"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7v8-qp3e-cua2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34739?format=json","vulnerability_id":"VCID-rzqy-gheq-cqgg","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4000","reference_id":"","reference_type":"","scores":[{"value":"0.93743","scoring_system":"epss","scoring_elements":"0.99852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.93743","scoring_system":"epss","scoring_elements":"0.99853","published_at":"2026-04-24T12:55:00Z"},{"value":"0.93743","scoring_system":"epss","scoring_elements":"0.99854","published_at":"2026-05-11T12:55:00Z"},{"value":"0.93743","scoring_system":"epss","scoring_elements":"0.99851","published_at":"2026-04-07T12:55:00Z"},{"value":"0.93743","scoring_system":"epss","scoring_elements":"0.99855","published_at":"2026-05-12T12:55:00Z"},{"value":"0.93743","scoring_system":"epss","scoring_elements":"0.99856","published_at":"2026-05-14T12:55:00Z"},{"value":"0.93894","scoring_system":"epss","scoring_elements":"0.99876","published_at":"2026-04-09T12:55:00Z"},{"value":"0.93894","scoring_system":"epss","scoring_elements":"0.99875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99875","published_at":"2026-04-12T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99873","published_at":"2026-04-01T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99877","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1223211","reference_id":"1223211","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1223211"},{"reference_url":"https://security.gentoo.org/glsa/201506-02","reference_id":"GLSA-201506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201506-02"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://security.gentoo.org/glsa/201701-46","reference_id":"GLSA-201701-46","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-46"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-70","reference_id":"mfsa2015-70","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-70"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1072","reference_id":"RHSA-2015:1072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1185","reference_id":"RHSA-2015:1185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1197","reference_id":"RHSA-2015:1197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2056","reference_id":"RHSA-2016:2056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2056"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4000"],"risk_score":7.2,"exploitability":"2.0","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqy-gheq-cqgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51691?format=json","vulnerability_id":"VCID-s76d-pjvk-63cr","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4485.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4485.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4485","reference_id":"","reference_type":"","scores":[{"value":"0.06105","scoring_system":"epss","scoring_elements":"0.90877","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.9181","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91818","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91855","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91856","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91852","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91867","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91866","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.9187","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91879","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91891","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91901","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.919","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91908","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07599","scoring_system":"epss","scoring_elements":"0.91871","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4485"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252292","reference_id":"1252292","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485","reference_id":"CVE-2015-4485","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-89","reference_id":"mfsa2015-89","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-89"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4485"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s76d-pjvk-63cr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51711?format=json","vulnerability_id":"VCID-teza-m5kj-s7ac","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4492.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4492","reference_id":"","reference_type":"","scores":[{"value":"0.01947","scoring_system":"epss","scoring_elements":"0.83641","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84677","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84712","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84714","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84743","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84761","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84757","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84774","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84772","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84798","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84808","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84824","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.8485","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84867","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84862","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84877","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84773","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252295","reference_id":"1252295","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252295"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-92","reference_id":"mfsa2015-92","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-92"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4492"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-teza-m5kj-s7ac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51694?format=json","vulnerability_id":"VCID-tsmv-w2tb-hyht","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4487","reference_id":"","reference_type":"","scores":[{"value":"0.02262","scoring_system":"epss","scoring_elements":"0.84785","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85754","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.8581","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.8582","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85835","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85832","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85828","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85868","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85877","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85878","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85897","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85918","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85935","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85934","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85947","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02676","scoring_system":"epss","scoring_elements":"0.85851","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252293","reference_id":"1252293","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252293"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-90","reference_id":"mfsa2015-90","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-90"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1682","reference_id":"RHSA-2015:1682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1682"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"},{"reference_url":"https://usn.ubuntu.com/2712-1/","reference_id":"USN-2712-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2712-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4487"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tsmv-w2tb-hyht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41212?format=json","vulnerability_id":"VCID-ua69-cwm3-8ubh","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2741.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2741.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2741","reference_id":"","reference_type":"","scores":[{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62402","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62147","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62207","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62237","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62204","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62289","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62279","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62257","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62303","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6231","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6232","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62314","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62261","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62367","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62347","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2741"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236963","reference_id":"1236963","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236963"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741","reference_id":"CVE-2015-2741","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-67","reference_id":"mfsa2015-67","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-67"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2741"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ua69-cwm3-8ubh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51659?format=json","vulnerability_id":"VCID-ueke-9crt-qybh","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4475.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4475.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4475","reference_id":"","reference_type":"","scores":[{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77748","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.7926","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79277","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79312","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79335","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79308","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79333","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79365","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.7937","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79386","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79395","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79417","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79436","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79455","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79331","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252276","reference_id":"1252276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252276"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-80","reference_id":"mfsa2015-80","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-80"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4475"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ueke-9crt-qybh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60736?format=json","vulnerability_id":"VCID-uzga-bp6y-27fy","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4497.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4497.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4497","reference_id":"","reference_type":"","scores":[{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86809","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86613","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86624","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86644","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86642","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86671","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86684","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86675","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86695","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86687","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86705","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86713","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86714","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86736","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86754","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86771","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86766","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86778","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1257276","reference_id":"1257276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1257276"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-94","reference_id":"mfsa2015-94","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-94"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1693","reference_id":"RHSA-2015:1693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1693"},{"reference_url":"https://usn.ubuntu.com/2723-1/","reference_id":"USN-2723-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2723-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4497"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uzga-bp6y-27fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51689?format=json","vulnerability_id":"VCID-v3rg-mrwe-yqck","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4484.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4484.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4484","reference_id":"","reference_type":"","scores":[{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.725","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74802","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74804","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74806","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74839","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74853","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74876","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74855","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74882","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.7488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74916","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74923","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74926","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74934","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74961","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74984","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74957","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74975","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.7489","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252289","reference_id":"1252289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252289"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-87","reference_id":"mfsa2015-87","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-87"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4484"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v3rg-mrwe-yqck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41025?format=json","vulnerability_id":"VCID-wh23-7b49-n3g5","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0813.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0813.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0813","reference_id":"","reference_type":"","scores":[{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86357","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86142","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86152","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86168","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86187","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86199","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86213","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.8621","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86206","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86223","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86229","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.8622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86251","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.8627","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86291","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.8631","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.86307","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02842","scoring_system":"epss","scoring_elements":"0.8632","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207088","reference_id":"1207088","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207088"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-31","reference_id":"mfsa2015-31","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0766","reference_id":"RHSA-2015:0766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0771","reference_id":"RHSA-2015:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0771"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"},{"reference_url":"https://usn.ubuntu.com/2552-1/","reference_id":"USN-2552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0813"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wh23-7b49-n3g5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51663?format=json","vulnerability_id":"VCID-x2yk-hpvu-6fg6","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4479.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4479.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4479","reference_id":"","reference_type":"","scores":[{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84761","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.8452","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84535","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84556","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.8456","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84581","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84588","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84607","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84602","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84617","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84618","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.8462","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84647","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84656","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84659","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84672","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84699","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84716","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84713","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02255","scoring_system":"epss","scoring_elements":"0.84729","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252285","reference_id":"1252285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252285"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-83","reference_id":"mfsa2015-83","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-83"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1586","reference_id":"RHSA-2015:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1586"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-4479"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x2yk-hpvu-6fg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41095?format=json","vulnerability_id":"VCID-xjf8-mc7t-hfah","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2724","reference_id":"","reference_type":"","scores":[{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.7605","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75798","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75802","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75813","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75881","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75855","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75893","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75896","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75882","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75919","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75929","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.7594","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75948","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75978","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.76002","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75986","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.76","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236947","reference_id":"1236947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236947"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-59","reference_id":"mfsa2015-59","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-59"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1455","reference_id":"RHSA-2015:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1455"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2724"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xjf8-mc7t-hfah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61306?format=json","vulnerability_id":"VCID-xqqq-rk53-ubhp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0833","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16159","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16052","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16086","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1608","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16264","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16325","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16123","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16275","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16149","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16083","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16099","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16138","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16025","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15984","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15865","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15976","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16076","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833","reference_id":"CVE-2015-0833","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833"},{"reference_url":"https://security.gentoo.org/glsa/201504-01","reference_id":"GLSA-201504-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-12","reference_id":"mfsa2015-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-12"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-58","reference_id":"mfsa2015-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-58"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86801?format=json","purl":"pkg:mozilla/SeaMonkey@2.33.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0"},{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0833"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqqq-rk53-ubhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41109?format=json","vulnerability_id":"VCID-xqxf-cnpj-3qas","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2728","reference_id":"","reference_type":"","scores":[{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77947","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.7769","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77697","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.7774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77751","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.7775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77786","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77785","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77778","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.7782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77834","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77846","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77876","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77895","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77884","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01072","scoring_system":"epss","scoring_elements":"0.77902","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236951","reference_id":"1236951","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236951"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-61","reference_id":"mfsa2015-61","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-61"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1207","reference_id":"RHSA-2015:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1207"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2728"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqxf-cnpj-3qas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51631?format=json","vulnerability_id":"VCID-xx39-5rg1-b3am","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2710","reference_id":"","reference_type":"","scores":[{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85283","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85058","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85071","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85121","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85135","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85133","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.8513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85151","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85154","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85184","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.8518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85194","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85219","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85238","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85233","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02421","scoring_system":"epss","scoring_elements":"0.85247","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220601","reference_id":"1220601","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1220601"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-48","reference_id":"mfsa2015-48","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-48"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0988","reference_id":"RHSA-2015:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1012","reference_id":"RHSA-2015:1012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1012"},{"reference_url":"https://usn.ubuntu.com/2602-1/","reference_id":"USN-2602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2602-1/"},{"reference_url":"https://usn.ubuntu.com/2603-1/","reference_id":"USN-2603-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2603-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-2710"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xx39-5rg1-b3am"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41009?format=json","vulnerability_id":"VCID-yq8w-7uvd-dyhk","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0810","reference_id":"","reference_type":"","scores":[{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60581","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60323","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60398","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60426","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60442","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60459","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60479","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60465","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60445","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60495","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60485","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60469","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60431","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60477","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60493","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.6052","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0810"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0810","reference_id":"CVE-2015-0810","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0810"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-35","reference_id":"mfsa2015-35","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-35"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0810"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yq8w-7uvd-dyhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41007?format=json","vulnerability_id":"VCID-ys1x-t7un-ayhr","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0807","reference_id":"","reference_type":"","scores":[{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33248","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33485","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33639","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33673","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33512","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.3359","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33584","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33543","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33519","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33554","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33318","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33236","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33125","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33192","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33231","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33142","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33169","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207076","reference_id":"1207076","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207076"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-37","reference_id":"mfsa2015-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-37"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0766","reference_id":"RHSA-2015:0766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0771","reference_id":"RHSA-2015:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0771"},{"reference_url":"https://usn.ubuntu.com/2550-1/","reference_id":"USN-2550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2550-1/"},{"reference_url":"https://usn.ubuntu.com/2552-1/","reference_id":"USN-2552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86807?format=json","purl":"pkg:mozilla/SeaMonkey@2.35.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}],"aliases":["CVE-2015-0807"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ys1x-t7un-ayhr"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"}