{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","type":"mozilla","namespace":"","name":"SeaMonkey","version":"2.38.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51660?format=json","vulnerability_id":"VCID-2rn3-ydxb-5ugu","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4477.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4477.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4477","reference_id":"","reference_type":"","scores":[{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86523","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86336","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86375","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86386","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86384","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86403","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86413","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.8641","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.8643","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86449","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86468","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86465","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86478","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0291","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4477"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252277","reference_id":"1252277","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4477","reference_id":"CVE-2015-4477","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4477"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-81","reference_id":"mfsa2015-81","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-81"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4477"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2rn3-ydxb-5ugu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63744?format=json","vulnerability_id":"VCID-2xup-1er1-xuh1","summary":"Security researcher David Chan reported that Mozilla's\nmozTCPSocket implementation could leak data past the end of an array,\nallowing for the potential exposure of memory or private data to malicious servers.\nThis feature is used by Firefox OS and is disabled by default in Firefox\non other operating systems.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4503.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4503","reference_id":"","reference_type":"","scores":[{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68951","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68681","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68718","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68696","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68747","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68766","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68789","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68774","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68745","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68787","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68797","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68776","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68824","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.6883","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68836","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68815","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68857","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68892","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68859","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68884","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68939","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4503"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265591","reference_id":"1265591","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4503","reference_id":"CVE-2015-4503","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4503"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-97","reference_id":"mfsa2015-97","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-97"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4503"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2xup-1er1-xuh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60744?format=json","vulnerability_id":"VCID-7rmg-2u67-kqf3","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4509.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4509.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4509","reference_id":"","reference_type":"","scores":[{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89731","published_at":"2026-05-15T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89591","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89594","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89607","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.8963","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89637","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89629","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89646","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.8964","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89655","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89659","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89658","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89669","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89686","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89698","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89693","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89703","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04937","scoring_system":"epss","scoring_elements":"0.89721","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265192","reference_id":"1265192","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265192"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-106","reference_id":"mfsa2015-106","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1834","reference_id":"RHSA-2015:1834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1852","reference_id":"RHSA-2015:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1852"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"},{"reference_url":"https://usn.ubuntu.com/2754-1/","reference_id":"USN-2754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2754-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4509"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7rmg-2u67-kqf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60740?format=json","vulnerability_id":"VCID-88kb-em1q-77gc","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4500.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4500.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4500","reference_id":"","reference_type":"","scores":[{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.87089","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86901","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.8692","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86913","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86955","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.8695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86959","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86963","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86961","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86985","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86987","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.87008","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.87024","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.87042","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.87037","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.87051","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.87082","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265186","reference_id":"1265186","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265186"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-96","reference_id":"mfsa2015-96","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-96"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1834","reference_id":"RHSA-2015:1834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1852","reference_id":"RHSA-2015:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1852"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"},{"reference_url":"https://usn.ubuntu.com/2754-1/","reference_id":"USN-2754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2754-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4500"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-88kb-em1q-77gc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63729?format=json","vulnerability_id":"VCID-9p7y-4cfe-ffag","summary":"Security researcher Spandan Veggalam reported a crash while using the\ndebugger API with SavedStacks in JavaScript. This crash can only occurs when the debugger is in use but may be potentially exploitable.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4507.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4507.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4507","reference_id":"","reference_type":"","scores":[{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79114","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78878","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78884","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78894","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78925","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78949","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78934","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78953","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78951","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78986","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79018","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79039","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79053","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79052","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79068","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79106","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4507"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265621","reference_id":"1265621","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507","reference_id":"CVE-2015-4507","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-102","reference_id":"mfsa2015-102","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-102"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4507"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9p7y-4cfe-ffag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63732?format=json","vulnerability_id":"VCID-acvt-dayv-bffc","summary":"Security researcher Felix Gröbert of Google discovered an out of\nbounds read in the QCMS color management library while manipulating an image with specific\nattributes in its ICC V4 profile. This causes a crash and could lead to information\ndisclosure.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4504.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4504.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4504","reference_id":"","reference_type":"","scores":[{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84239","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.83986","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84001","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84017","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.8405","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84061","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84056","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84079","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84082","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84083","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84108","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84114","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.8412","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84141","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84164","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.8418","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84179","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84197","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.84229","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4504"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265596","reference_id":"1265596","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4504","reference_id":"CVE-2015-4504","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4504"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-98","reference_id":"mfsa2015-98","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-98"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4504"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-acvt-dayv-bffc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63720?format=json","vulnerability_id":"VCID-cs7b-d8pb-9udp","summary":"Security researcher Looben Yang discovered a use-after-free\nvulnerability when using a shared worker with IndexedDB due to a race condition with the\nworker. This results in a potentially exploitable crash that can be triggered through web\ncontent.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4510.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4510.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4510","reference_id":"","reference_type":"","scores":[{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85565","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85326","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85357","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85359","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85381","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.8539","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85405","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85403","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85399","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85423","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85424","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85444","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85453","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85452","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85468","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85492","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.8551","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85506","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85519","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02515","scoring_system":"epss","scoring_elements":"0.85556","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4510"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265190","reference_id":"1265190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265190"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4510","reference_id":"CVE-2015-4510","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4510"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-104","reference_id":"mfsa2015-104","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-104"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4510"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cs7b-d8pb-9udp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63723?format=json","vulnerability_id":"VCID-hacx-3yt1-bfgk","summary":"Security researcher Francisco Alonso of the NowSecure Research Team\nused the Address Sanitizer tool to discover an out-of-bounds read issue during 2D canvas\nrendering. This was due to an issue in the cairo graphics library when surfaces are\ncreated with 32-bit color depth but displayed on a 16-bit color depth system, which is\nunsupported. This allows an attacker to read an amount of random memory following the heap\nfor the 16-bit surface leading to information disclosure.\nThis issue is specific to Linux in certain configurations and does not\naffect Windows or OS X systems.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4512.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4512","reference_id":"","reference_type":"","scores":[{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83878","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83615","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83627","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83642","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83668","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83675","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83685","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83681","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83716","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83742","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.8375","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83756","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83779","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83799","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83817","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83816","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83832","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02006","scoring_system":"epss","scoring_elements":"0.83867","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4512"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265769","reference_id":"1265769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4512","reference_id":"CVE-2015-4512","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4512"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-107","reference_id":"mfsa2015-107","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-107"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4512"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hacx-3yt1-bfgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63727?format=json","vulnerability_id":"VCID-kare-ffhq-93dc","summary":"Security researcher André Bargull reported that when a web page\ncreates a scripted proxy for the window with a handler defined a certain way, a reference\nto the inner window will be passed, rather than that of the outer window in violation of\nthe specification.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4502.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4502","reference_id":"","reference_type":"","scores":[{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73775","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73546","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73578","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.7355","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73586","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73622","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73604","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73596","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.7364","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73649","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73673","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73682","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73676","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73701","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73725","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73686","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73709","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73767","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4502"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265771","reference_id":"1265771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265771"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4502","reference_id":"CVE-2015-4502","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4502"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-108","reference_id":"mfsa2015-108","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-108"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4502"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kare-ffhq-93dc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51684?format=json","vulnerability_id":"VCID-p86b-vnu2-6fbu","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4483.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4483.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4483","reference_id":"","reference_type":"","scores":[{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53373","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53197","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53246","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53214","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53266","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53312","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53297","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.5328","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53323","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53303","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53274","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53285","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53247","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53205","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53255","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53307","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53268","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53294","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53362","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4483"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252288","reference_id":"1252288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4483","reference_id":"CVE-2015-4483","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4483"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-86","reference_id":"mfsa2015-86","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-86"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4483"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p86b-vnu2-6fbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60746?format=json","vulnerability_id":"VCID-qeyy-sqj3-3kfp","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4511.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4511","reference_id":"","reference_type":"","scores":[{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88487","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88309","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88317","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88331","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88336","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88355","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88362","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88372","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88364","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88379","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88376","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88392","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88397","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88398","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88409","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88425","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88438","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88436","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.8845","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0396","scoring_system":"epss","scoring_elements":"0.88478","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265630","reference_id":"1265630","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265630"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-105","reference_id":"mfsa2015-105","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1834","reference_id":"RHSA-2015:1834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1834"},{"reference_url":"https://usn.ubuntu.com/2754-1/","reference_id":"USN-2754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2754-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4511"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qeyy-sqj3-3kfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60742?format=json","vulnerability_id":"VCID-qjuf-f8ec-byc7","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4506.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4506.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4506","reference_id":"","reference_type":"","scores":[{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92154","published_at":"2026-05-15T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92045","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92058","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92063","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92078","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92082","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92089","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92086","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92084","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92097","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.9211","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92118","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92125","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07974","scoring_system":"epss","scoring_elements":"0.92146","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265617","reference_id":"1265617","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265617"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-101","reference_id":"mfsa2015-101","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1834","reference_id":"RHSA-2015:1834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1834"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"},{"reference_url":"https://usn.ubuntu.com/2754-1/","reference_id":"USN-2754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2754-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4506"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qjuf-f8ec-byc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60750?format=json","vulnerability_id":"VCID-sz8x-vmck-6yc5","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4519.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4519.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4519","reference_id":"","reference_type":"","scores":[{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63164","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62954","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62983","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63015","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63019","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62996","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63054","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63009","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63055","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63108","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63069","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63097","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63153","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265778","reference_id":"1265778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265778"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-110","reference_id":"mfsa2015-110","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1834","reference_id":"RHSA-2015:1834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1852","reference_id":"RHSA-2015:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1852"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"},{"reference_url":"https://usn.ubuntu.com/2754-1/","reference_id":"USN-2754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2754-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4519"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sz8x-vmck-6yc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63716?format=json","vulnerability_id":"VCID-t7wm-9sa4-2yff","summary":"Security researcher Ronald Crane reported two issues in the libGLES\nportions of the ANGLE graphics library, used for WebGL and OpenGL content on Windows\nsystems. The first of these is a missing bounds check leading to memory safety errors when\nmanipulating shaders which could result in the writing to unowned memory. The second issue\nalso affects shaders when insufficient memory is allocated for a shader attribute array,\nleading to a buffer overflow. Both of these issues can lead to a potentially exploitable\ncrash.\nThese issues are specific to Windows and does not affect Linux or OS X\nsystems.\nIn general this flaw cannot be exploited through email in the\nThunderbird product because scripting is disabled, but is potentially a risk in\nbrowser or browser-like contexts.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7178.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7178.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7178","reference_id":"","reference_type":"","scores":[{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81415","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81207","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81239","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81265","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81291","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81278","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.8127","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81307","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81309","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81308","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.8133","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81337","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81342","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81359","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81379","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81401","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81397","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01736","scoring_system":"epss","scoring_elements":"0.82679","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01736","scoring_system":"epss","scoring_elements":"0.82672","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7178"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265201","reference_id":"1265201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7178","reference_id":"CVE-2015-7178","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7178"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-113","reference_id":"mfsa2015-113","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-113"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-7178"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t7wm-9sa4-2yff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63742?format=json","vulnerability_id":"VCID-tmb8-vc5k-tbbc","summary":"Security researcher Juho Nurminen reported a mechanism to spoof the\nURL displayed in the addressbar in reader mode by manipulating the loaded URL. This flaw\nallows for the URL displayed to be different than that the web content rendered. This\nallows for potential spoofing but the effects are mitigated due to the restrictions reader\nmode places when rendering content.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4508.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4508","reference_id":"","reference_type":"","scores":[{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72115","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71884","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71891","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71911","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71882","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71932","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71956","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71963","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71952","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71996","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72003","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72001","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71994","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72027","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72057","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72021","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72048","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72106","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4508"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265624","reference_id":"1265624","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4508","reference_id":"CVE-2015-4508","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4508"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-103","reference_id":"mfsa2015-103","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-103"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4508"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tmb8-vc5k-tbbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51703?format=json","vulnerability_id":"VCID-uur2-nxhu-hkev","summary":"Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4490.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4490.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4490","reference_id":"","reference_type":"","scores":[{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44847","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44827","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56588","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56618","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56623","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56632","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56617","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56587","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56522","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.5654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56476","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56526","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.5659","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56539","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56563","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56616","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.5647","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4490"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252294","reference_id":"1252294","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4490","reference_id":"CVE-2015-4490","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4490"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-91","reference_id":"mfsa2015-91","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-91"},{"reference_url":"https://usn.ubuntu.com/2702-1/","reference_id":"USN-2702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4490"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uur2-nxhu-hkev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60749?format=json","vulnerability_id":"VCID-vs2t-gwzk-6ubt","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4517.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4517.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4517","reference_id":"","reference_type":"","scores":[{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87159","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.86961","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.86972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.86991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.86984","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87004","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87011","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87025","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87019","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87013","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87029","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87033","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.8703","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.8705","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87055","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87057","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87076","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87092","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87109","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87104","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87119","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03205","scoring_system":"epss","scoring_elements":"0.87151","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265784","reference_id":"1265784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265784"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-112","reference_id":"mfsa2015-112","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1834","reference_id":"RHSA-2015:1834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1852","reference_id":"RHSA-2015:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1852"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"},{"reference_url":"https://usn.ubuntu.com/2754-1/","reference_id":"USN-2754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2754-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4517"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vs2t-gwzk-6ubt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41213?format=json","vulnerability_id":"VCID-wmk8-kk5t-ufdd","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2742","reference_id":"","reference_type":"","scores":[{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68363","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.6809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68112","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68131","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68174","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68199","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68186","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68191","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68202","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68185","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68227","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68236","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68241","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68216","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68261","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68299","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68263","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.6829","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.6835","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2742","reference_id":"CVE-2015-2742","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2742"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-68","reference_id":"mfsa2015-68","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-68"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-2742"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wmk8-kk5t-ufdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63730?format=json","vulnerability_id":"VCID-xnzh-y88g-guhd","summary":"Mozilla developer Jeff Walden reported that in Gecko's implementation\nof ECMAScript 5 API's enforces non-configurable properties with logic specific to each API.\nScripts that do not go through these APIs can bypass these protections and make changes to\nthe immutable properties in violation of security protections. This could potentially\nallow for web content to run in a privileged context leading to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4516.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4516.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4516","reference_id":"","reference_type":"","scores":[{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80292","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80053","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80061","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.8007","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80098","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80106","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80125","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80101","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.8013","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80131","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80133","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80161","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80168","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80183","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80197","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80219","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80234","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.8023","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80246","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01352","scoring_system":"epss","scoring_elements":"0.80288","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4516"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265775","reference_id":"1265775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4516","reference_id":"CVE-2015-4516","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4516"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-109","reference_id":"mfsa2015-109","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-109"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4516"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xnzh-y88g-guhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60751?format=json","vulnerability_id":"VCID-y4jx-5cgd-kbbp","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4520.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4520.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4520","reference_id":"","reference_type":"","scores":[{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69429","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69164","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.6918","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.692","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69232","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.6925","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69258","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69229","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69268","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69277","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69257","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69308","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69315","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69323","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69301","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69343","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69378","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69347","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69371","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00592","scoring_system":"epss","scoring_elements":"0.69417","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265781","reference_id":"1265781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265781"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-111","reference_id":"mfsa2015-111","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1834","reference_id":"RHSA-2015:1834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1852","reference_id":"RHSA-2015:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1852"},{"reference_url":"https://usn.ubuntu.com/2743-1/","reference_id":"USN-2743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2743-1/"},{"reference_url":"https://usn.ubuntu.com/2754-1/","reference_id":"USN-2754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2754-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86808?format=json","purl":"pkg:mozilla/SeaMonkey@2.38.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}],"aliases":["CVE-2015-4520"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y4jx-5cgd-kbbp"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0"}