Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
Typedeb
Namespacedebian
Namefirefox-esr
Version140.8.0esr-1~deb13u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version140.9.1esr-1~deb13u1
Latest_non_vulnerable_version140.9.1esr-1~deb13u1
Affected_by_vulnerabilities
0
url VCID-13he-qsr4-h3d4
vulnerability_id VCID-13he-qsr4-h3d4
summary Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4709.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4709.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4709
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06438
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0629
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06339
published_at 2026-04-13T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.0635
published_at 2026-04-12T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06355
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06266
published_at 2026-04-02T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06362
published_at 2026-04-09T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06322
published_at 2026-04-08T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.063
published_at 2026-04-04T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06276
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4709
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4709
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450726
reference_id 2450726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450726
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:27:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:27:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:27:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:27:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:27:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2016329
reference_id show_bug.cgi?id=2016329
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:27:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2016329
41
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2016342
reference_id show_bug.cgi?id=2016342
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:27:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2016342
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4709
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13he-qsr4-h3d4
1
url VCID-1fv1-edht-ufag
vulnerability_id VCID-1fv1-edht-ufag
summary Uninitialized memory in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4715.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4715.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4715
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06224
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06078
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06062
published_at 2026-04-04T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06117
published_at 2026-04-11T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06126
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06087
published_at 2026-04-08T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06047
published_at 2026-04-07T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06027
published_at 2026-04-02T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06067
published_at 2026-04-16T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06105
published_at 2026-04-13T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06112
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4715
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4715
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450723
reference_id 2450723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450723
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:34:24Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:34:24Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:34:24Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:34:24Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2018405
reference_id show_bug.cgi?id=2018405
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:34:24Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2018405
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4715
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1fv1-edht-ufag
2
url VCID-23eu-22t2-cydd
vulnerability_id VCID-23eu-22t2-cydd
summary Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4714.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4714.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4714
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05425
published_at 2026-04-21T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05276
published_at 2026-04-18T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05324
published_at 2026-04-07T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05349
published_at 2026-04-11T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05381
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05357
published_at 2026-04-08T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05298
published_at 2026-04-04T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05265
published_at 2026-04-02T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05274
published_at 2026-04-16T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05326
published_at 2026-04-13T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05337
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4714
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4714
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450725
reference_id 2450725
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450725
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:10:07Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:10:07Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:10:07Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:10:07Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2018126
reference_id show_bug.cgi?id=2018126
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:10:07Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2018126
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4714
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23eu-22t2-cydd
3
url VCID-26d3-ctnj-7kbh
vulnerability_id VCID-26d3-ctnj-7kbh
summary Use-after-free in the CSS Parsing and Computation component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4691.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4691
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10185
published_at 2026-04-21T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10054
published_at 2026-04-18T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10092
published_at 2026-04-07T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10223
published_at 2026-04-12T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10264
published_at 2026-04-11T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10228
published_at 2026-04-09T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10167
published_at 2026-04-08T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10196
published_at 2026-04-04T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10131
published_at 2026-04-02T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10076
published_at 2026-04-16T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10204
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4691
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450738
reference_id 2450738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450738
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:49:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:49:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:49:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:49:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:49:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2017512
reference_id show_bug.cgi?id=2017512
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:49:03Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2017512
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4691
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26d3-ctnj-7kbh
4
url VCID-289s-f2w6-53g9
vulnerability_id VCID-289s-f2w6-53g9
summary Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4716.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4716.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4716
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06224
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06078
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06047
published_at 2026-04-07T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06117
published_at 2026-04-11T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06126
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06087
published_at 2026-04-08T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06062
published_at 2026-04-04T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06027
published_at 2026-04-02T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06067
published_at 2026-04-16T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06105
published_at 2026-04-13T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06112
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4716
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4716
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450720
reference_id 2450720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450720
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:24:14Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:24:14Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:24:14Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:24:14Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2018592
reference_id show_bug.cgi?id=2018592
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:24:14Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2018592
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4716
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-289s-f2w6-53g9
5
url VCID-351y-4nek-u3aw
vulnerability_id VCID-351y-4nek-u3aw
summary JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4698.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4698
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07439
published_at 2026-04-18T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07468
published_at 2026-04-07T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07524
published_at 2026-04-13T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07537
published_at 2026-04-12T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07551
published_at 2026-04-11T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07549
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07527
published_at 2026-04-08T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07487
published_at 2026-04-04T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07448
published_at 2026-04-02T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07449
published_at 2026-04-16T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12851
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4698
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4698
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450719
reference_id 2450719
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450719
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:59:20Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:59:20Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:59:20Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:59:20Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:59:20Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2020906
reference_id show_bug.cgi?id=2020906
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:59:20Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2020906
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4698
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-351y-4nek-u3aw
6
url VCID-3grf-hwk1-3fh8
vulnerability_id VCID-3grf-hwk1-3fh8
summary Incorrect boundary conditions in the Graphics: Text component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4719.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4719.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4719
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05425
published_at 2026-04-21T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05276
published_at 2026-04-18T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05324
published_at 2026-04-07T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05349
published_at 2026-04-11T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05381
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05357
published_at 2026-04-08T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05298
published_at 2026-04-04T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05265
published_at 2026-04-02T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05274
published_at 2026-04-16T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05326
published_at 2026-04-13T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05337
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4719
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4719
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450746
reference_id 2450746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450746
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:08:12Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:08:12Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:08:12Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:08:12Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2016367
reference_id show_bug.cgi?id=2016367
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:08:12Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2016367
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4719
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3grf-hwk1-3fh8
7
url VCID-3kd3-hwzv-efbn
vulnerability_id VCID-3kd3-hwzv-efbn
summary Memory safety bugs present in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4721.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4721
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06333
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06184
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06155
published_at 2026-04-07T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06223
published_at 2026-04-12T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06228
published_at 2026-04-11T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06237
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06198
published_at 2026-04-08T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06172
published_at 2026-04-16T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06141
published_at 2026-04-02T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06213
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4721
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450711
reference_id 2450711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450711
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=2013762%2C2015291%2C2016591%2C2016661%2C2016664%2C2017303%2C2017894%2C2018090%2C2018196%2C2018379%2C2019112%2C2022090%2C2022243%2C2022351%2C2022478%2C2022676
reference_id buglist.cgi?bug_id=2013762%2C2015291%2C2016591%2C2016661%2C2016664%2C2017303%2C2017894%2C2018090%2C2018196%2C2018379%2C2019112%2C2022090%2C2022243%2C2022351%2C2022478%2C2022676
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:11Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=2013762%2C2015291%2C2016591%2C2016661%2C2016664%2C2017303%2C2017894%2C2018090%2C2018196%2C2018379%2C2019112%2C2022090%2C2022243%2C2022351%2C2022478%2C2022676
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
7
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:11Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
9
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:11Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
11
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:11Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
13
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:11Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
15
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:11Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
16
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
17
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
18
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
19
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
20
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
21
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
22
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
23
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
24
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
25
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
26
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
27
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
28
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
29
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
30
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
31
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
32
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
33
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
34
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
35
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
36
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
37
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
38
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
39
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
40
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4721
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3kd3-hwzv-efbn
8
url VCID-3xgu-7evz-mffw
vulnerability_id VCID-3xgu-7evz-mffw
summary Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4705.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4705.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4705
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05737
published_at 2026-04-21T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05579
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05592
published_at 2026-04-07T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05629
published_at 2026-04-11T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05656
published_at 2026-04-09T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.0563
published_at 2026-04-08T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05594
published_at 2026-04-04T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05557
published_at 2026-04-02T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05565
published_at 2026-04-16T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05614
published_at 2026-04-13T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.0562
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4705
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4705
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450722
reference_id 2450722
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450722
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:38:48Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:38:48Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:38:48Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:38:48Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2014873
reference_id show_bug.cgi?id=2014873
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:38:48Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2014873
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4705
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3xgu-7evz-mffw
9
url VCID-4q6w-tdk9-d3an
vulnerability_id VCID-4q6w-tdk9-d3an
summary Memory safety bugs present in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4720.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4720.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4720
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06224
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06078
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06047
published_at 2026-04-07T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06117
published_at 2026-04-11T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06126
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06087
published_at 2026-04-08T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06062
published_at 2026-04-04T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06027
published_at 2026-04-02T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06067
published_at 2026-04-16T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06105
published_at 2026-04-13T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06112
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4720
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4720
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450751
reference_id 2450751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450751
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=2004652%2C2019372%2C2021922%2C2022567%2C2022733
reference_id buglist.cgi?bug_id=2004652%2C2019372%2C2021922%2C2022567%2C2022733
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:10Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=2004652%2C2019372%2C2021922%2C2022567%2C2022733
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
7
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:10Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
9
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:10Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
11
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:10Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
13
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:10Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
14
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
15
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
16
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
17
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
18
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
19
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
20
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
21
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
22
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
23
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
24
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
25
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
26
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
27
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
28
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
29
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
30
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
31
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
32
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
33
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
34
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
35
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
36
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
37
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
38
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4720
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4q6w-tdk9-d3an
10
url VCID-5dw5-vpt8-zqbz
vulnerability_id VCID-5dw5-vpt8-zqbz
summary Memory safety bugs present in Firefox ESR 115.34.0, Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5731.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5731.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-5731
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17187
published_at 2026-04-08T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17176
published_at 2026-04-12T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17223
published_at 2026-04-11T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17244
published_at 2026-04-09T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20167
published_at 2026-04-21T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20168
published_at 2026-04-18T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.21869
published_at 2026-04-16T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.21867
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-5731
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5731
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2455901
reference_id 2455901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2455901
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-25
reference_id mfsa2026-25
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-25
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-25/
reference_id mfsa2026-25
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-25/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-26
reference_id mfsa2026-26
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-26
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-26/
reference_id mfsa2026-26
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-26/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-27
reference_id mfsa2026-27
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-27
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-27/
reference_id mfsa2026-27
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-27/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-28
reference_id mfsa2026-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-28
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-28/
reference_id mfsa2026-28
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-28/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-29
reference_id mfsa2026-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-29
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-29/
reference_id mfsa2026-29
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-29/
15
reference_url https://access.redhat.com/errata/RHSA-2026:7671
reference_id RHSA-2026:7671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7671
16
reference_url https://access.redhat.com/errata/RHSA-2026:7672
reference_id RHSA-2026:7672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7672
17
reference_url https://access.redhat.com/errata/RHSA-2026:8052
reference_id RHSA-2026:8052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8052
18
reference_url https://access.redhat.com/errata/RHSA-2026:8459
reference_id RHSA-2026:8459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8459
19
reference_url https://access.redhat.com/errata/RHSA-2026:9345
reference_id RHSA-2026:9345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9345
20
reference_url https://access.redhat.com/errata/RHSA-2026:9638
reference_id RHSA-2026:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9638
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1
1
url pkg:deb/debian/firefox-esr@140.9.1esr-1
purl pkg:deb/debian/firefox-esr@140.9.1esr-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2fqb-r5zb-a7dp
1
vulnerability VCID-3kv6-c148-nkhq
2
vulnerability VCID-59d3-343b-e3aw
3
vulnerability VCID-61r1-arbe-dke4
4
vulnerability VCID-7jt2-zr49-7ye5
5
vulnerability VCID-95et-ezmb-buau
6
vulnerability VCID-9nbw-7c9e-13af
7
vulnerability VCID-av7u-3g4m-mugm
8
vulnerability VCID-bwth-uepr-z7a3
9
vulnerability VCID-cjsm-7gxr-8ygw
10
vulnerability VCID-d16s-p141-qbft
11
vulnerability VCID-f81v-9fv8-93cd
12
vulnerability VCID-fxjm-ywug-f3d5
13
vulnerability VCID-hk2m-rbdy-nqhc
14
vulnerability VCID-ma29-qa7e-9qb4
15
vulnerability VCID-nge1-4cvg-zqb2
16
vulnerability VCID-nyum-jpbc-abew
17
vulnerability VCID-p6yz-xs58-u3gm
18
vulnerability VCID-pfmd-zv8f-8bfc
19
vulnerability VCID-q689-wneh-hbdq
20
vulnerability VCID-q8qp-5szp-mfe8
21
vulnerability VCID-ruqn-mk9t-57hb
22
vulnerability VCID-tv7r-qf2c-dqbm
23
vulnerability VCID-w98r-yagc-kkec
24
vulnerability VCID-z6tm-b352-5uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1
aliases CVE-2026-5731
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5dw5-vpt8-zqbz
11
url VCID-646f-ndeq-5bee
vulnerability_id VCID-646f-ndeq-5bee
summary Sandbox escape due to incorrect boundary conditions in the Telemetry component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4687.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4687.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4687
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06543
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06394
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06376
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06454
published_at 2026-04-12T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06461
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06468
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06425
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06388
published_at 2026-04-04T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06357
published_at 2026-04-02T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06385
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06444
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4687
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4687
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450757
reference_id 2450757
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450757
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2016368
reference_id show_bug.cgi?id=2016368
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2016368
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4687
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-646f-ndeq-5bee
12
url VCID-675n-7uzz-pqdj
vulnerability_id VCID-675n-7uzz-pqdj
summary Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4688.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4688.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4688
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05519
published_at 2026-04-21T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05357
published_at 2026-04-18T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05385
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05422
published_at 2026-04-11T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05449
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05426
published_at 2026-04-08T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05392
published_at 2026-04-07T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05355
published_at 2026-04-02T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05354
published_at 2026-04-16T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05401
published_at 2026-04-13T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05409
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4688
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4688
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450713
reference_id 2450713
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450713
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2016373
reference_id show_bug.cgi?id=2016373
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:59Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2016373
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4688
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-675n-7uzz-pqdj
13
url VCID-77y6-jskt-qucb
vulnerability_id VCID-77y6-jskt-qucb
summary libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59375.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59375.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59375
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12206
published_at 2026-04-21T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15871
published_at 2026-04-04T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15748
published_at 2026-04-08T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15663
published_at 2026-04-07T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15808
published_at 2026-04-09T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15811
published_at 2026-04-02T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18262
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18121
published_at 2026-04-18T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18108
published_at 2026-04-16T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18164
published_at 2026-04-13T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18215
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59375
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59375
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/libexpat/libexpat/issues/1018
reference_id 1018
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:T/RC:C
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-15T20:22:58Z/
url https://github.com/libexpat/libexpat/issues/1018
5
reference_url https://github.com/libexpat/libexpat/pull/1034
reference_id 1034
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:T/RC:C
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-15T20:22:58Z/
url https://github.com/libexpat/libexpat/pull/1034
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1115298
reference_id 1115298
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1115298
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395108
reference_id 2395108
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395108
8
reference_url https://issues.oss-fuzz.com/issues/439133977
reference_id 439133977
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:T/RC:C
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-15T20:22:58Z/
url https://issues.oss-fuzz.com/issues/439133977
9
reference_url https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes
reference_id Changes
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:T/RC:C
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-15T20:22:58Z/
url https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes
10
reference_url https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74
reference_id Changes#L45-L74
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:T/RC:C
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-15T20:22:58Z/
url https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
15
reference_url https://access.redhat.com/errata/RHSA-2025:19020
reference_id RHSA-2025:19020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19020
16
reference_url https://access.redhat.com/errata/RHSA-2025:19403
reference_id RHSA-2025:19403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19403
17
reference_url https://access.redhat.com/errata/RHSA-2025:21030
reference_id RHSA-2025:21030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21030
18
reference_url https://access.redhat.com/errata/RHSA-2025:21773
reference_id RHSA-2025:21773
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21773
19
reference_url https://access.redhat.com/errata/RHSA-2025:21776
reference_id RHSA-2025:21776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21776
20
reference_url https://access.redhat.com/errata/RHSA-2025:21974
reference_id RHSA-2025:21974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21974
21
reference_url https://access.redhat.com/errata/RHSA-2025:22033
reference_id RHSA-2025:22033
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22033
22
reference_url https://access.redhat.com/errata/RHSA-2025:22034
reference_id RHSA-2025:22034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22034
23
reference_url https://access.redhat.com/errata/RHSA-2025:22035
reference_id RHSA-2025:22035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22035
24
reference_url https://access.redhat.com/errata/RHSA-2025:22175
reference_id RHSA-2025:22175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22175
25
reference_url https://access.redhat.com/errata/RHSA-2025:22607
reference_id RHSA-2025:22607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22607
26
reference_url https://access.redhat.com/errata/RHSA-2025:22618
reference_id RHSA-2025:22618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22618
27
reference_url https://access.redhat.com/errata/RHSA-2025:22785
reference_id RHSA-2025:22785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22785
28
reference_url https://access.redhat.com/errata/RHSA-2025:22842
reference_id RHSA-2025:22842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22842
29
reference_url https://access.redhat.com/errata/RHSA-2025:22871
reference_id RHSA-2025:22871
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22871
30
reference_url https://access.redhat.com/errata/RHSA-2025:22935
reference_id RHSA-2025:22935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22935
31
reference_url https://access.redhat.com/errata/RHSA-2025:23078
reference_id RHSA-2025:23078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23078
32
reference_url https://access.redhat.com/errata/RHSA-2025:23079
reference_id RHSA-2025:23079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23079
33
reference_url https://access.redhat.com/errata/RHSA-2025:23080
reference_id RHSA-2025:23080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23080
34
reference_url https://access.redhat.com/errata/RHSA-2025:23202
reference_id RHSA-2025:23202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23202
35
reference_url https://access.redhat.com/errata/RHSA-2025:23204
reference_id RHSA-2025:23204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23204
36
reference_url https://access.redhat.com/errata/RHSA-2025:23205
reference_id RHSA-2025:23205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23205
37
reference_url https://access.redhat.com/errata/RHSA-2025:23209
reference_id RHSA-2025:23209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23209
38
reference_url https://access.redhat.com/errata/RHSA-2025:23227
reference_id RHSA-2025:23227
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23227
39
reference_url https://access.redhat.com/errata/RHSA-2025:23248
reference_id RHSA-2025:23248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23248
40
reference_url https://access.redhat.com/errata/RHSA-2025:23449
reference_id RHSA-2025:23449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23449
41
reference_url https://access.redhat.com/errata/RHSA-2025:23550
reference_id RHSA-2025:23550
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23550
42
reference_url https://access.redhat.com/errata/RHSA-2026:0001
reference_id RHSA-2026:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0001
43
reference_url https://access.redhat.com/errata/RHSA-2026:0076
reference_id RHSA-2026:0076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0076
44
reference_url https://access.redhat.com/errata/RHSA-2026:0077
reference_id RHSA-2026:0077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0077
45
reference_url https://access.redhat.com/errata/RHSA-2026:0078
reference_id RHSA-2026:0078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0078
46
reference_url https://access.redhat.com/errata/RHSA-2026:0326
reference_id RHSA-2026:0326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0326
47
reference_url https://access.redhat.com/errata/RHSA-2026:0332
reference_id RHSA-2026:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0332
48
reference_url https://access.redhat.com/errata/RHSA-2026:0414
reference_id RHSA-2026:0414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0414
49
reference_url https://access.redhat.com/errata/RHSA-2026:0420
reference_id RHSA-2026:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0420
50
reference_url https://access.redhat.com/errata/RHSA-2026:0518
reference_id RHSA-2026:0518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0518
51
reference_url https://access.redhat.com/errata/RHSA-2026:0674
reference_id RHSA-2026:0674
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0674
52
reference_url https://access.redhat.com/errata/RHSA-2026:0677
reference_id RHSA-2026:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0677
53
reference_url https://access.redhat.com/errata/RHSA-2026:0702
reference_id RHSA-2026:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0702
54
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
55
reference_url https://access.redhat.com/errata/RHSA-2026:0996
reference_id RHSA-2026:0996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0996
56
reference_url https://access.redhat.com/errata/RHSA-2026:1541
reference_id RHSA-2026:1541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1541
57
reference_url https://access.redhat.com/errata/RHSA-2026:1652
reference_id RHSA-2026:1652
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1652
58
reference_url https://access.redhat.com/errata/RHSA-2026:3407
reference_id RHSA-2026:3407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3407
59
reference_url https://access.redhat.com/errata/RHSA-2026:3461
reference_id RHSA-2026:3461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3461
60
reference_url https://access.redhat.com/errata/RHSA-2026:3462
reference_id RHSA-2026:3462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3462
61
reference_url https://access.redhat.com/errata/RHSA-2026:5396
reference_id RHSA-2026:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5396
62
reference_url https://usn.ubuntu.com/8022-1/
reference_id USN-8022-1
reference_type
scores
url https://usn.ubuntu.com/8022-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2025-59375
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-77y6-jskt-qucb
14
url VCID-8qyy-e4jt-rbc4
vulnerability_id VCID-8qyy-e4jt-rbc4
summary Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4695.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4695
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05256
published_at 2026-04-21T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05103
published_at 2026-04-18T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05164
published_at 2026-04-07T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05184
published_at 2026-04-11T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05214
published_at 2026-04-09T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05197
published_at 2026-04-08T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05142
published_at 2026-04-04T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05113
published_at 2026-04-02T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05098
published_at 2026-04-16T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05154
published_at 2026-04-13T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05168
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4695
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450715
reference_id 2450715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450715
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:53:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:53:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:53:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:53:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2020030
reference_id show_bug.cgi?id=2020030
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:53:58Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2020030
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4695
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8qyy-e4jt-rbc4
15
url VCID-8vka-qus2-tbhj
vulnerability_id VCID-8vka-qus2-tbhj
summary Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, Firefox ESR < 115.32.1, Thunderbird < 140.7.2, and Thunderbird < 147.0.2.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2447.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2447.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2447
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03896
published_at 2026-04-11T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03897
published_at 2026-04-07T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.03902
published_at 2026-04-08T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03927
published_at 2026-04-09T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03877
published_at 2026-04-12T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03874
published_at 2026-04-02T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03958
published_at 2026-04-21T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.03839
published_at 2026-04-18T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.03829
published_at 2026-04-16T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.0385
published_at 2026-04-13T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.03884
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2447
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2447
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128283
reference_id 1128283
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128283
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2440219
reference_id 2440219
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2440219
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-10
reference_id mfsa2026-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-10
7
reference_url https://www.mozilla.org/security/advisories/mfsa2026-10/
reference_id mfsa2026-10
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-17T14:52:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-10/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-11
reference_id mfsa2026-11
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-11
9
reference_url https://www.mozilla.org/security/advisories/mfsa2026-11/
reference_id mfsa2026-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-17T14:52:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-11/
10
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
11
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
12
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
13
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
14
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
15
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
16
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
17
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
18
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
19
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
20
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
21
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
22
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
23
reference_url https://access.redhat.com/errata/RHSA-2026:3967
reference_id RHSA-2026:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3967
24
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
25
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
26
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
27
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
28
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
29
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
30
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
31
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
32
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
33
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
34
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
35
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
36
reference_url https://access.redhat.com/errata/RHSA-2026:4447
reference_id RHSA-2026:4447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4447
37
reference_url https://access.redhat.com/errata/RHSA-2026:4629
reference_id RHSA-2026:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4629
38
reference_url https://access.redhat.com/errata/RHSA-2026:5227
reference_id RHSA-2026:5227
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5227
39
reference_url https://access.redhat.com/errata/RHSA-2026:5228
reference_id RHSA-2026:5228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5228
40
reference_url https://access.redhat.com/errata/RHSA-2026:5229
reference_id RHSA-2026:5229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5229
41
reference_url https://access.redhat.com/errata/RHSA-2026:5230
reference_id RHSA-2026:5230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5230
42
reference_url https://access.redhat.com/errata/RHSA-2026:5231
reference_id RHSA-2026:5231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5231
43
reference_url https://access.redhat.com/errata/RHSA-2026:5319
reference_id RHSA-2026:5319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5319
44
reference_url https://access.redhat.com/errata/RHSA-2026:5320
reference_id RHSA-2026:5320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5320
45
reference_url https://access.redhat.com/errata/RHSA-2026:5323
reference_id RHSA-2026:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5323
46
reference_url https://access.redhat.com/errata/RHSA-2026:5324
reference_id RHSA-2026:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5324
47
reference_url https://access.redhat.com/errata/RHSA-2026:5326
reference_id RHSA-2026:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5326
48
reference_url https://access.redhat.com/errata/RHSA-2026:8746
reference_id RHSA-2026:8746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8746
49
reference_url https://access.redhat.com/errata/RHSA-2026:8747
reference_id RHSA-2026:8747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8747
50
reference_url https://access.redhat.com/errata/RHSA-2026:8748
reference_id RHSA-2026:8748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8748
51
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2014390
reference_id show_bug.cgi?id=2014390
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-17T14:52:59Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2014390
52
reference_url https://usn.ubuntu.com/8053-1/
reference_id USN-8053-1
reference_type
scores
url https://usn.ubuntu.com/8053-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-2447
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8vka-qus2-tbhj
16
url VCID-8xek-k5y2-6bfp
vulnerability_id VCID-8xek-k5y2-6bfp
summary Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4689.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4689.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4689
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07676
published_at 2026-04-21T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07536
published_at 2026-04-18T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07598
published_at 2026-04-04T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07637
published_at 2026-04-12T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.0765
published_at 2026-04-11T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07649
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07632
published_at 2026-04-08T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07573
published_at 2026-04-07T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07556
published_at 2026-04-02T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07548
published_at 2026-04-16T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07623
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4689
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4689
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450718
reference_id 2450718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450718
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:00Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:00Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:00Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:00Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:00Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2016374
reference_id show_bug.cgi?id=2016374
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:00Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2016374
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4689
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8xek-k5y2-6bfp
17
url VCID-9ag7-z86d-nba9
vulnerability_id VCID-9ag7-z86d-nba9
summary Memory safety bugs present in Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5734.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-5734
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13876
published_at 2026-04-12T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13903
published_at 2026-04-08T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13955
published_at 2026-04-09T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13912
published_at 2026-04-11T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18576
published_at 2026-04-21T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18602
published_at 2026-04-13T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18556
published_at 2026-04-18T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18547
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-5734
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5734
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2455897
reference_id 2455897
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2455897
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=2022369%2C2023026%2C2023545%2C2023555%2C2023958%2C2025422%2C2025468%2C2025492%2C2025505
reference_id buglist.cgi?bug_id=2022369%2C2023026%2C2023545%2C2023555%2C2023958%2C2025422%2C2025468%2C2025492%2C2025505
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=2022369%2C2023026%2C2023545%2C2023555%2C2023958%2C2025422%2C2025468%2C2025492%2C2025505
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-25
reference_id mfsa2026-25
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-25
7
reference_url https://www.mozilla.org/security/advisories/mfsa2026-25/
reference_id mfsa2026-25
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/
url https://www.mozilla.org/security/advisories/mfsa2026-25/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-27
reference_id mfsa2026-27
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-27
9
reference_url https://www.mozilla.org/security/advisories/mfsa2026-27/
reference_id mfsa2026-27
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/
url https://www.mozilla.org/security/advisories/mfsa2026-27/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-28
reference_id mfsa2026-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-28
11
reference_url https://www.mozilla.org/security/advisories/mfsa2026-28/
reference_id mfsa2026-28
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/
url https://www.mozilla.org/security/advisories/mfsa2026-28/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-29
reference_id mfsa2026-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-29
13
reference_url https://www.mozilla.org/security/advisories/mfsa2026-29/
reference_id mfsa2026-29
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/
url https://www.mozilla.org/security/advisories/mfsa2026-29/
14
reference_url https://access.redhat.com/errata/RHSA-2026:7671
reference_id RHSA-2026:7671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7671
15
reference_url https://access.redhat.com/errata/RHSA-2026:7672
reference_id RHSA-2026:7672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7672
16
reference_url https://access.redhat.com/errata/RHSA-2026:8052
reference_id RHSA-2026:8052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8052
17
reference_url https://access.redhat.com/errata/RHSA-2026:8459
reference_id RHSA-2026:8459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8459
18
reference_url https://access.redhat.com/errata/RHSA-2026:9345
reference_id RHSA-2026:9345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9345
19
reference_url https://access.redhat.com/errata/RHSA-2026:9638
reference_id RHSA-2026:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9638
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1
1
url pkg:deb/debian/firefox-esr@140.9.1esr-1
purl pkg:deb/debian/firefox-esr@140.9.1esr-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2fqb-r5zb-a7dp
1
vulnerability VCID-3kv6-c148-nkhq
2
vulnerability VCID-59d3-343b-e3aw
3
vulnerability VCID-61r1-arbe-dke4
4
vulnerability VCID-7jt2-zr49-7ye5
5
vulnerability VCID-95et-ezmb-buau
6
vulnerability VCID-9nbw-7c9e-13af
7
vulnerability VCID-av7u-3g4m-mugm
8
vulnerability VCID-bwth-uepr-z7a3
9
vulnerability VCID-cjsm-7gxr-8ygw
10
vulnerability VCID-d16s-p141-qbft
11
vulnerability VCID-f81v-9fv8-93cd
12
vulnerability VCID-fxjm-ywug-f3d5
13
vulnerability VCID-hk2m-rbdy-nqhc
14
vulnerability VCID-ma29-qa7e-9qb4
15
vulnerability VCID-nge1-4cvg-zqb2
16
vulnerability VCID-nyum-jpbc-abew
17
vulnerability VCID-p6yz-xs58-u3gm
18
vulnerability VCID-pfmd-zv8f-8bfc
19
vulnerability VCID-q689-wneh-hbdq
20
vulnerability VCID-q8qp-5szp-mfe8
21
vulnerability VCID-ruqn-mk9t-57hb
22
vulnerability VCID-tv7r-qf2c-dqbm
23
vulnerability VCID-w98r-yagc-kkec
24
vulnerability VCID-z6tm-b352-5uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1
aliases CVE-2026-5734
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ag7-z86d-nba9
18
url VCID-b4bq-q3ga-3ff1
vulnerability_id VCID-b4bq-q3ga-3ff1
summary Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4707.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4707.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4707
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03727
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0628
published_at 2026-04-07T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06294
published_at 2026-04-18T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06354
published_at 2026-04-12T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06359
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06366
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06326
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06303
published_at 2026-04-04T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06269
published_at 2026-04-02T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06281
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06343
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4707
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4707
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450755
reference_id 2450755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450755
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:37:12Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:37:12Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:37:12Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:37:12Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:37:12Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2015267
reference_id show_bug.cgi?id=2015267
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:37:12Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2015267
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4707
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b4bq-q3ga-3ff1
19
url VCID-b6sf-z5tm-4uau
vulnerability_id VCID-b6sf-z5tm-4uau
summary Use-after-free in the Layout: Text and Fonts component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4696.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4696
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07567
published_at 2026-04-21T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07439
published_at 2026-04-18T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07468
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07537
published_at 2026-04-12T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07551
published_at 2026-04-11T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07549
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07527
published_at 2026-04-08T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07487
published_at 2026-04-04T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07448
published_at 2026-04-02T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07449
published_at 2026-04-16T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07524
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4696
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4696
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450740
reference_id 2450740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450740
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:56:36Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:56:36Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:56:36Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:56:36Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:56:36Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2020190
reference_id show_bug.cgi?id=2020190
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T12:56:36Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2020190
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4696
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b6sf-z5tm-4uau
20
url VCID-e2k8-m9sm-8uek
vulnerability_id VCID-e2k8-m9sm-8uek
summary Incorrect boundary conditions in the Layout: Text and Fonts component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4699.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4699.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4699
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06443
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06294
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0628
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06354
published_at 2026-04-12T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06359
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06366
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06326
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06303
published_at 2026-04-04T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06269
published_at 2026-04-02T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06281
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06343
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4699
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4699
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450739
reference_id 2450739
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450739
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:00:42Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:00:42Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:00:42Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:00:42Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:00:42Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2021863
reference_id show_bug.cgi?id=2021863
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:00:42Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2021863
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4699
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e2k8-m9sm-8uek
21
url VCID-f81v-9fv8-93cd
vulnerability_id VCID-f81v-9fv8-93cd
summary
Out-of-bounds Write
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5217.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5217.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5217
reference_id
reference_type
scores
0
value 0.03573
scoring_system epss
scoring_elements 0.87744
published_at 2026-04-18T12:55:00Z
1
value 0.03573
scoring_system epss
scoring_elements 0.87745
published_at 2026-04-16T12:55:00Z
2
value 0.03573
scoring_system epss
scoring_elements 0.87731
published_at 2026-04-13T12:55:00Z
3
value 0.03573
scoring_system epss
scoring_elements 0.87733
published_at 2026-04-12T12:55:00Z
4
value 0.03573
scoring_system epss
scoring_elements 0.8774
published_at 2026-04-11T12:55:00Z
5
value 0.03573
scoring_system epss
scoring_elements 0.87728
published_at 2026-04-09T12:55:00Z
6
value 0.03573
scoring_system epss
scoring_elements 0.87722
published_at 2026-04-08T12:55:00Z
7
value 0.04175
scoring_system epss
scoring_elements 0.88708
published_at 2026-04-21T12:55:00Z
8
value 0.049
scoring_system epss
scoring_elements 0.89576
published_at 2026-04-07T12:55:00Z
9
value 0.049
scoring_system epss
scoring_elements 0.89562
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5217
2
reference_url https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software
3
reference_url https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241191
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2241191
5
reference_url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html
6
reference_url https://crbug.com/1486441
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://crbug.com/1486441
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5186
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5187
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
13
reference_url http://seclists.org/fulldisclosure/2023/Oct/12
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://seclists.org/fulldisclosure/2023/Oct/12
14
reference_url http://seclists.org/fulldisclosure/2023/Oct/16
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://seclists.org/fulldisclosure/2023/Oct/16
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://github.com/electron/electron
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron
17
reference_url https://github.com/electron/electron/pull/40022
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/40022
18
reference_url https://github.com/electron/electron/pull/40023
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/40023
19
reference_url https://github.com/electron/electron/pull/40024
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/40024
20
reference_url https://github.com/electron/electron/pull/40025
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/40025
21
reference_url https://github.com/electron/electron/pull/40026
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/40026
22
reference_url https://github.com/electron/electron/releases/tag/v22.3.25
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/releases/tag/v22.3.25
23
reference_url https://github.com/electron/electron/releases/tag/v24.8.5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/releases/tag/v24.8.5
24
reference_url https://github.com/electron/electron/releases/tag/v25.8.4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/releases/tag/v25.8.4
25
reference_url https://github.com/electron/electron/releases/tag/v26.2.4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/releases/tag/v26.2.4
26
reference_url https://github.com/electron/electron/releases/tag/v27.0.0-beta.8
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/releases/tag/v27.0.0-beta.8
27
reference_url https://github.com/webmproject/libvpx/commit/3fbd1dca6a4d2dad332a2110d646e4ffef36d590
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://github.com/webmproject/libvpx/commit/3fbd1dca6a4d2dad332a2110d646e4ffef36d590
28
reference_url https://github.com/webmproject/libvpx/commit/af6dedd715f4307669366944cca6e0417b290282
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://github.com/webmproject/libvpx/commit/af6dedd715f4307669366944cca6e0417b290282
29
reference_url https://github.com/webmproject/libvpx/releases/tag/v1.13.1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://github.com/webmproject/libvpx/releases/tag/v1.13.1
30
reference_url https://github.com/webmproject/libvpx/tags
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://github.com/webmproject/libvpx/tags
31
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00038.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00038.html
32
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00001.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00001.html
33
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html
34
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV
37
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV/
38
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD
39
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63
40
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6
42
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/
43
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB
44
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I
45
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/
46
reference_url https://pastebin.com/TdkC4pDv
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://pastebin.com/TdkC4pDv
47
reference_url https://security.gentoo.org/glsa/202310-04
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://security.gentoo.org/glsa/202310-04
48
reference_url https://security.gentoo.org/glsa/202401-34
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://security.gentoo.org/glsa/202401-34
49
reference_url https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217
50
reference_url https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217/
51
reference_url https://support.apple.com/kb/HT213961
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://support.apple.com/kb/HT213961
52
reference_url https://support.apple.com/kb/HT213972
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://support.apple.com/kb/HT213972
53
reference_url https://twitter.com/maddiestone/status/1707163313711497266
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://twitter.com/maddiestone/status/1707163313711497266
54
reference_url https://www.debian.org/security/2023/dsa-5508
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://www.debian.org/security/2023/dsa-5508
55
reference_url https://www.debian.org/security/2023/dsa-5509
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://www.debian.org/security/2023/dsa-5509
56
reference_url https://www.debian.org/security/2023/dsa-5510
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://www.debian.org/security/2023/dsa-5510
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-44
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value critical
scoring_system generic_textual
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-44
58
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/
59
reference_url https://www.openwall.com/lists/oss-security/2023/09/28/5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://www.openwall.com/lists/oss-security/2023/09/28/5
60
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/5
61
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/6
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/6
62
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/1
63
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/11
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/11
64
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/12
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/12
65
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/14
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/14
66
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/2
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/2
67
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/7
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/7
68
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/9
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/9
69
reference_url http://www.openwall.com/lists/oss-security/2023/09/30/1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/30/1
70
reference_url http://www.openwall.com/lists/oss-security/2023/09/30/2
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/30/2
71
reference_url http://www.openwall.com/lists/oss-security/2023/09/30/3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/30/3
72
reference_url http://www.openwall.com/lists/oss-security/2023/09/30/4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/30/4
73
reference_url http://www.openwall.com/lists/oss-security/2023/09/30/5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/30/5
74
reference_url http://www.openwall.com/lists/oss-security/2023/10/01/1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/10/01/1
75
reference_url http://www.openwall.com/lists/oss-security/2023/10/01/2
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/10/01/2
76
reference_url http://www.openwall.com/lists/oss-security/2023/10/01/5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/10/01/5
77
reference_url http://www.openwall.com/lists/oss-security/2023/10/02/6
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/10/02/6
78
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/11
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/11
79
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053182
reference_id 1053182
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053182
80
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/
reference_id AY642Z6JZODQJE7Z62CFREVUHEGCXGPD
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/
81
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-5217
reference_id CVE-2023-5217
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-5217
82
reference_url https://security-tracker.debian.org/tracker/CVE-2023-5217
reference_id CVE-2023-5217
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://security-tracker.debian.org/tracker/CVE-2023-5217
83
reference_url https://github.com/advisories/GHSA-qqvq-6xgj-jw8g
reference_id GHSA-qqvq-6xgj-jw8g
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qqvq-6xgj-jw8g
84
reference_url https://access.redhat.com/errata/RHSA-2023:5426
reference_id RHSA-2023:5426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5426
85
reference_url https://access.redhat.com/errata/RHSA-2023:5427
reference_id RHSA-2023:5427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5427
86
reference_url https://access.redhat.com/errata/RHSA-2023:5428
reference_id RHSA-2023:5428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5428
87
reference_url https://access.redhat.com/errata/RHSA-2023:5429
reference_id RHSA-2023:5429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5429
88
reference_url https://access.redhat.com/errata/RHSA-2023:5430
reference_id RHSA-2023:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5430
89
reference_url https://access.redhat.com/errata/RHSA-2023:5432
reference_id RHSA-2023:5432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5432
90
reference_url https://access.redhat.com/errata/RHSA-2023:5433
reference_id RHSA-2023:5433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5433
91
reference_url https://access.redhat.com/errata/RHSA-2023:5434
reference_id RHSA-2023:5434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5434
92
reference_url https://access.redhat.com/errata/RHSA-2023:5435
reference_id RHSA-2023:5435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5435
93
reference_url https://access.redhat.com/errata/RHSA-2023:5436
reference_id RHSA-2023:5436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5436
94
reference_url https://access.redhat.com/errata/RHSA-2023:5437
reference_id RHSA-2023:5437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5437
95
reference_url https://access.redhat.com/errata/RHSA-2023:5438
reference_id RHSA-2023:5438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5438
96
reference_url https://access.redhat.com/errata/RHSA-2023:5439
reference_id RHSA-2023:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5439
97
reference_url https://access.redhat.com/errata/RHSA-2023:5440
reference_id RHSA-2023:5440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5440
98
reference_url https://access.redhat.com/errata/RHSA-2023:5475
reference_id RHSA-2023:5475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5475
99
reference_url https://access.redhat.com/errata/RHSA-2023:5477
reference_id RHSA-2023:5477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5477
100
reference_url https://access.redhat.com/errata/RHSA-2023:5534
reference_id RHSA-2023:5534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5534
101
reference_url https://access.redhat.com/errata/RHSA-2023:5535
reference_id RHSA-2023:5535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5535
102
reference_url https://access.redhat.com/errata/RHSA-2023:5536
reference_id RHSA-2023:5536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5536
103
reference_url https://access.redhat.com/errata/RHSA-2023:5537
reference_id RHSA-2023:5537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5537
104
reference_url https://access.redhat.com/errata/RHSA-2023:5538
reference_id RHSA-2023:5538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5538
105
reference_url https://access.redhat.com/errata/RHSA-2023:5539
reference_id RHSA-2023:5539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5539
106
reference_url https://access.redhat.com/errata/RHSA-2023:5540
reference_id RHSA-2023:5540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5540
107
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/
reference_id TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/
108
reference_url https://usn.ubuntu.com/6403-1/
reference_id USN-6403-1
reference_type
scores
url https://usn.ubuntu.com/6403-1/
109
reference_url https://usn.ubuntu.com/6403-2/
reference_id USN-6403-2
reference_type
scores
url https://usn.ubuntu.com/6403-2/
110
reference_url https://usn.ubuntu.com/6403-3/
reference_id USN-6403-3
reference_type
scores
url https://usn.ubuntu.com/6403-3/
111
reference_url https://usn.ubuntu.com/6404-1/
reference_id USN-6404-1
reference_type
scores
url https://usn.ubuntu.com/6404-1/
112
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
113
reference_url https://usn.ubuntu.com/7172-1/
reference_id USN-7172-1
reference_type
scores
url https://usn.ubuntu.com/7172-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
1
url pkg:deb/debian/firefox-esr@140.9.1esr-1
purl pkg:deb/debian/firefox-esr@140.9.1esr-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2fqb-r5zb-a7dp
1
vulnerability VCID-3kv6-c148-nkhq
2
vulnerability VCID-59d3-343b-e3aw
3
vulnerability VCID-61r1-arbe-dke4
4
vulnerability VCID-7jt2-zr49-7ye5
5
vulnerability VCID-95et-ezmb-buau
6
vulnerability VCID-9nbw-7c9e-13af
7
vulnerability VCID-av7u-3g4m-mugm
8
vulnerability VCID-bwth-uepr-z7a3
9
vulnerability VCID-cjsm-7gxr-8ygw
10
vulnerability VCID-d16s-p141-qbft
11
vulnerability VCID-f81v-9fv8-93cd
12
vulnerability VCID-fxjm-ywug-f3d5
13
vulnerability VCID-hk2m-rbdy-nqhc
14
vulnerability VCID-ma29-qa7e-9qb4
15
vulnerability VCID-nge1-4cvg-zqb2
16
vulnerability VCID-nyum-jpbc-abew
17
vulnerability VCID-p6yz-xs58-u3gm
18
vulnerability VCID-pfmd-zv8f-8bfc
19
vulnerability VCID-q689-wneh-hbdq
20
vulnerability VCID-q8qp-5szp-mfe8
21
vulnerability VCID-ruqn-mk9t-57hb
22
vulnerability VCID-tv7r-qf2c-dqbm
23
vulnerability VCID-w98r-yagc-kkec
24
vulnerability VCID-z6tm-b352-5uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1
2
url pkg:deb/debian/firefox-esr@140.10.0esr-1
purl pkg:deb/debian/firefox-esr@140.10.0esr-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f81v-9fv8-93cd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1
aliases CVE-2023-5217, GHSA-qqvq-6xgj-jw8g
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f81v-9fv8-93cd
22
url VCID-ft6u-geds-fua9
vulnerability_id VCID-ft6u-geds-fua9
summary JIT miscompilation in the JavaScript Engine component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4702.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4702.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4702
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06224
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06078
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06047
published_at 2026-04-07T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06117
published_at 2026-04-11T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06126
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06087
published_at 2026-04-08T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06062
published_at 2026-04-04T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06027
published_at 2026-04-02T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06067
published_at 2026-04-16T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06105
published_at 2026-04-13T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06112
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4702
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450744
reference_id 2450744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450744
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:48:14Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:48:14Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:48:14Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:48:14Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2013560
reference_id show_bug.cgi?id=2013560
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:48:14Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2013560
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4702
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ft6u-geds-fua9
23
url VCID-gkva-6cu9-7keg
vulnerability_id VCID-gkva-6cu9-7keg
summary Sandbox escape in the Responsive Design Mode component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4692.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4692.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4692
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.07112
published_at 2026-04-21T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0698
published_at 2026-04-18T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06982
published_at 2026-04-07T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.07064
published_at 2026-04-12T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.07075
published_at 2026-04-11T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.07068
published_at 2026-04-09T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.07037
published_at 2026-04-08T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.07002
published_at 2026-04-04T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06948
published_at 2026-04-02T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06995
published_at 2026-04-16T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.07055
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4692
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4692
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450748
reference_id 2450748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450748
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:56Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:56Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:56Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:56Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:56Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2017643
reference_id show_bug.cgi?id=2017643
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:56Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2017643
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4692
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gkva-6cu9-7keg
24
url VCID-hshc-4xnc-gug4
vulnerability_id VCID-hshc-4xnc-gug4
summary Denial-of-service in the WebRTC: Signaling component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4704.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4704.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4704
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05256
published_at 2026-04-21T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05103
published_at 2026-04-18T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05164
published_at 2026-04-07T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05184
published_at 2026-04-11T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05214
published_at 2026-04-09T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05197
published_at 2026-04-08T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05142
published_at 2026-04-04T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05113
published_at 2026-04-02T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05098
published_at 2026-04-16T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05154
published_at 2026-04-13T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05168
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4704
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4704
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450756
reference_id 2450756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450756
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T17:50:26Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T17:50:26Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T17:50:26Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T17:50:26Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2014868
reference_id show_bug.cgi?id=2014868
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T17:50:26Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2014868
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4704
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hshc-4xnc-gug4
25
url VCID-hstd-23qm-bqdg
vulnerability_id VCID-hstd-23qm-bqdg
summary Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4717.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4717.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4717
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06224
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06078
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06047
published_at 2026-04-07T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06117
published_at 2026-04-11T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06126
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06087
published_at 2026-04-08T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06062
published_at 2026-04-04T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06027
published_at 2026-04-02T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06067
published_at 2026-04-16T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06105
published_at 2026-04-13T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06112
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4717
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4717
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450712
reference_id 2450712
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450712
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:09Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:09Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:09Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:09Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2021695
reference_id show_bug.cgi?id=2021695
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:09Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2021695
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4717
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hstd-23qm-bqdg
26
url VCID-j1hb-8jjy-tqgq
vulnerability_id VCID-j1hb-8jjy-tqgq
summary Incorrect boundary conditions in the Audio/Video: Playback component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4693.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4693.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4693
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06443
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06294
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0628
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06354
published_at 2026-04-12T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06359
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06366
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06326
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06303
published_at 2026-04-04T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06269
published_at 2026-04-02T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06281
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06343
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4693
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4693
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450741
reference_id 2450741
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450741
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:50:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:50:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:50:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:50:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:50:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2018102
reference_id show_bug.cgi?id=2018102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:50:23Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2018102
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4693
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j1hb-8jjy-tqgq
27
url VCID-kuwd-6tcg-fuha
vulnerability_id VCID-kuwd-6tcg-fuha
summary Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4713.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4713.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4713
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05425
published_at 2026-04-21T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05276
published_at 2026-04-18T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05324
published_at 2026-04-07T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05349
published_at 2026-04-11T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05381
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05357
published_at 2026-04-08T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05298
published_at 2026-04-04T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05265
published_at 2026-04-02T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05274
published_at 2026-04-16T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05326
published_at 2026-04-13T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05337
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4713
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4713
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450730
reference_id 2450730
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450730
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:13:05Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:13:05Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:13:05Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:13:05Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2018113
reference_id show_bug.cgi?id=2018113
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:13:05Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2018113
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4713
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kuwd-6tcg-fuha
28
url VCID-m6uv-91wz-xfdv
vulnerability_id VCID-m6uv-91wz-xfdv
summary Mitigation bypass in the Networking: HTTP component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4700.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4700.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4700
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.06069
published_at 2026-04-21T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05916
published_at 2026-04-18T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05901
published_at 2026-04-07T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05959
published_at 2026-04-11T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05978
published_at 2026-04-09T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05939
published_at 2026-04-08T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.0591
published_at 2026-04-04T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-02T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05905
published_at 2026-04-16T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.0594
published_at 2026-04-13T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.0595
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4700
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4700
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450752
reference_id 2450752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450752
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T13:02:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T13:02:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T13:02:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T13:02:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2003766
reference_id show_bug.cgi?id=2003766
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T13:02:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2003766
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4700
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m6uv-91wz-xfdv
29
url VCID-mm6w-kpe8-4kg3
vulnerability_id VCID-mm6w-kpe8-4kg3
summary Race condition, use-after-free in the Graphics: WebRender component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4684.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4684.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4684
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02941
published_at 2026-04-21T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02825
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02853
published_at 2026-04-04T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02835
published_at 2026-04-12T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02854
published_at 2026-04-11T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02884
published_at 2026-04-09T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02863
published_at 2026-04-08T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02861
published_at 2026-04-07T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02837
published_at 2026-04-02T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02814
published_at 2026-04-16T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.0283
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4684
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4684
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450721
reference_id 2450721
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450721
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T14:13:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T14:13:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T14:13:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T14:13:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T14:13:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2011129
reference_id show_bug.cgi?id=2011129
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T14:13:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2011129
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4684
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mm6w-kpe8-4kg3
30
url VCID-nvsz-9s3r-nbhq
vulnerability_id VCID-nvsz-9s3r-nbhq
summary Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4718.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4718.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4718
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01757
published_at 2026-04-21T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01668
published_at 2026-04-18T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01692
published_at 2026-04-04T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01686
published_at 2026-04-11T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01701
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01693
published_at 2026-04-08T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01691
published_at 2026-04-07T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01683
published_at 2026-04-02T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01665
published_at 2026-04-16T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01676
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4718
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4718
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450742
reference_id 2450742
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450742
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:11:07Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:11:07Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:11:07Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:11:07Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2014864
reference_id show_bug.cgi?id=2014864
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:11:07Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2014864
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4718
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nvsz-9s3r-nbhq
31
url VCID-qbzp-euvv-q7c7
vulnerability_id VCID-qbzp-euvv-q7c7
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5732.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5732.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-5732
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.1175
published_at 2026-04-12T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11789
published_at 2026-04-11T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11778
published_at 2026-04-09T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11723
published_at 2026-04-08T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12843
published_at 2026-04-21T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12835
published_at 2026-04-13T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12738
published_at 2026-04-16T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12742
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-5732
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5732
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2455908
reference_id 2455908
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2455908
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-25
reference_id mfsa2026-25
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-25
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-25/
reference_id mfsa2026-25
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-25/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-27
reference_id mfsa2026-27
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-27
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-27/
reference_id mfsa2026-27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-27/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-28
reference_id mfsa2026-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-28
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-28/
reference_id mfsa2026-28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-28/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-29
reference_id mfsa2026-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-29
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-29/
reference_id mfsa2026-29
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-29/
13
reference_url https://access.redhat.com/errata/RHSA-2026:7671
reference_id RHSA-2026:7671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7671
14
reference_url https://access.redhat.com/errata/RHSA-2026:7672
reference_id RHSA-2026:7672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7672
15
reference_url https://access.redhat.com/errata/RHSA-2026:8052
reference_id RHSA-2026:8052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8052
16
reference_url https://access.redhat.com/errata/RHSA-2026:8459
reference_id RHSA-2026:8459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8459
17
reference_url https://access.redhat.com/errata/RHSA-2026:9345
reference_id RHSA-2026:9345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9345
18
reference_url https://access.redhat.com/errata/RHSA-2026:9638
reference_id RHSA-2026:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9638
19
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2017867
reference_id show_bug.cgi?id=2017867
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2017867
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1
1
url pkg:deb/debian/firefox-esr@140.9.1esr-1
purl pkg:deb/debian/firefox-esr@140.9.1esr-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2fqb-r5zb-a7dp
1
vulnerability VCID-3kv6-c148-nkhq
2
vulnerability VCID-59d3-343b-e3aw
3
vulnerability VCID-61r1-arbe-dke4
4
vulnerability VCID-7jt2-zr49-7ye5
5
vulnerability VCID-95et-ezmb-buau
6
vulnerability VCID-9nbw-7c9e-13af
7
vulnerability VCID-av7u-3g4m-mugm
8
vulnerability VCID-bwth-uepr-z7a3
9
vulnerability VCID-cjsm-7gxr-8ygw
10
vulnerability VCID-d16s-p141-qbft
11
vulnerability VCID-f81v-9fv8-93cd
12
vulnerability VCID-fxjm-ywug-f3d5
13
vulnerability VCID-hk2m-rbdy-nqhc
14
vulnerability VCID-ma29-qa7e-9qb4
15
vulnerability VCID-nge1-4cvg-zqb2
16
vulnerability VCID-nyum-jpbc-abew
17
vulnerability VCID-p6yz-xs58-u3gm
18
vulnerability VCID-pfmd-zv8f-8bfc
19
vulnerability VCID-q689-wneh-hbdq
20
vulnerability VCID-q8qp-5szp-mfe8
21
vulnerability VCID-ruqn-mk9t-57hb
22
vulnerability VCID-tv7r-qf2c-dqbm
23
vulnerability VCID-w98r-yagc-kkec
24
vulnerability VCID-z6tm-b352-5uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1
aliases CVE-2026-5732
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbzp-euvv-q7c7
32
url VCID-qkks-24cp-gqg2
vulnerability_id VCID-qkks-24cp-gqg2
summary Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4706.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4706.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4706
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06443
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06294
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06303
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06354
published_at 2026-04-12T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06359
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06366
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06326
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.0628
published_at 2026-04-07T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06269
published_at 2026-04-02T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06281
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06343
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4706
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450714
reference_id 2450714
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450714
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:38:16Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:38:16Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:38:16Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:38:16Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:38:16Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2015091
reference_id show_bug.cgi?id=2015091
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:38:16Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2015091
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4706
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qkks-24cp-gqg2
33
url VCID-rp5h-ym8y-skbw
vulnerability_id VCID-rp5h-ym8y-skbw
summary Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4701.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4701.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4701
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06224
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06078
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06047
published_at 2026-04-07T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06117
published_at 2026-04-11T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06126
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06087
published_at 2026-04-08T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06062
published_at 2026-04-04T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06027
published_at 2026-04-02T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06067
published_at 2026-04-16T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06105
published_at 2026-04-13T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06112
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4701
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4701
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450710
reference_id 2450710
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450710
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T13:04:34Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T13:04:34Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T13:04:34Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T13:04:34Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2009303
reference_id show_bug.cgi?id=2009303
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-26T13:04:34Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2009303
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4701
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rp5h-ym8y-skbw
34
url VCID-t4t3-5pt5-ayds
vulnerability_id VCID-t4t3-5pt5-ayds
summary Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4685.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4685.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4685
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06443
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06294
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0628
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06354
published_at 2026-04-12T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06359
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06366
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06326
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06303
published_at 2026-04-04T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06269
published_at 2026-04-02T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06281
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06343
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4685
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4685
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450724
reference_id 2450724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450724
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:43:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:43:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:43:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:43:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:43:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2016349
reference_id show_bug.cgi?id=2016349
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:43:23Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2016349
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4685
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4t3-5pt5-ayds
35
url VCID-u3j3-fc4f-7ff7
vulnerability_id VCID-u3j3-fc4f-7ff7
summary Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4686.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4686.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4686
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06443
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06294
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0628
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06354
published_at 2026-04-12T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06359
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06366
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06326
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06303
published_at 2026-04-04T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06269
published_at 2026-04-02T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06281
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06343
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4686
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4686
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450734
reference_id 2450734
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450734
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:44:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:44:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:44:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:44:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:44:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2016351
reference_id show_bug.cgi?id=2016351
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:44:29Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2016351
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4686
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u3j3-fc4f-7ff7
36
url VCID-wmyy-2cg3-wyhc
vulnerability_id VCID-wmyy-2cg3-wyhc
summary Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4697.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4697.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4697
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05256
published_at 2026-04-21T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05103
published_at 2026-04-18T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05164
published_at 2026-04-07T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05184
published_at 2026-04-11T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05214
published_at 2026-04-09T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05197
published_at 2026-04-08T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05142
published_at 2026-04-04T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05113
published_at 2026-04-02T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05098
published_at 2026-04-16T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05154
published_at 2026-04-13T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05168
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4697
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4697
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450729
reference_id 2450729
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450729
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:57:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:57:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:57:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:57:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2020422
reference_id show_bug.cgi?id=2020422
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:57:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2020422
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4697
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wmyy-2cg3-wyhc
37
url VCID-wqw2-gjvu-6qbu
vulnerability_id VCID-wqw2-gjvu-6qbu
summary Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4690.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4690.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4690
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03218
published_at 2026-04-21T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.0554
published_at 2026-04-08T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05479
published_at 2026-04-18T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05518
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05525
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05537
published_at 2026-04-11T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05562
published_at 2026-04-09T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05504
published_at 2026-04-07T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05469
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4690
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4690
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450732
reference_id 2450732
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450732
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:01Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:01Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:01Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:01Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:01Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2016375
reference_id show_bug.cgi?id=2016375
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:56:01Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2016375
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4690
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqw2-gjvu-6qbu
38
url VCID-wvx2-pba2-sqha
vulnerability_id VCID-wvx2-pba2-sqha
summary Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4708.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4708.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4708
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05425
published_at 2026-04-21T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05276
published_at 2026-04-18T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05324
published_at 2026-04-07T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05349
published_at 2026-04-11T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05381
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05357
published_at 2026-04-08T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05298
published_at 2026-04-04T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05265
published_at 2026-04-02T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05274
published_at 2026-04-16T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05326
published_at 2026-04-13T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05337
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4708
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4708
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450735
reference_id 2450735
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450735
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:28:54Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:28:54Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:28:54Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:28:54Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2015268
reference_id show_bug.cgi?id=2015268
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T16:28:54Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2015268
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4708
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wvx2-pba2-sqha
39
url VCID-yjc2-2whn-uug5
vulnerability_id VCID-yjc2-2whn-uug5
summary Incorrect boundary conditions, integer overflow in the Graphics component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4694.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4694
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05569
published_at 2026-04-21T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.054
published_at 2026-04-18T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05442
published_at 2026-04-13T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05448
published_at 2026-04-12T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05462
published_at 2026-04-11T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05393
published_at 2026-04-16T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.0549
published_at 2026-04-09T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05469
published_at 2026-04-08T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05434
published_at 2026-04-07T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05426
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4694
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450747
reference_id 2450747
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450747
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:52:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
reference_id mfsa2026-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-21
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-21/
reference_id mfsa2026-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:52:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-21/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:52:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:52:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:52:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
15
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
16
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
17
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
18
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
19
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
20
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
21
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
22
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
23
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
24
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
25
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
26
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
27
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
28
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
29
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
30
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
31
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
32
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
33
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
34
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
35
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
36
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
37
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
38
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
39
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2018430
reference_id show_bug.cgi?id=2018430
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:52:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2018430
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4694
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yjc2-2whn-uug5
40
url VCID-ymak-rv52-h7a5
vulnerability_id VCID-ymak-rv52-h7a5
summary Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4710.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4710
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06224
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06078
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06062
published_at 2026-04-04T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06117
published_at 2026-04-11T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06126
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06087
published_at 2026-04-08T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06047
published_at 2026-04-07T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06027
published_at 2026-04-02T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06067
published_at 2026-04-16T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06105
published_at 2026-04-13T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06112
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4710
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450727
reference_id 2450727
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450727
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
reference_id mfsa2026-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-20
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-20/
reference_id mfsa2026-20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T18:52:46Z/
url https://www.mozilla.org/security/advisories/mfsa2026-20/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
reference_id mfsa2026-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-22
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-22/
reference_id mfsa2026-22
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T18:52:46Z/
url https://www.mozilla.org/security/advisories/mfsa2026-22/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
reference_id mfsa2026-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-23
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-23/
reference_id mfsa2026-23
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T18:52:46Z/
url https://www.mozilla.org/security/advisories/mfsa2026-23/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
reference_id mfsa2026-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-24
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-24/
reference_id mfsa2026-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T18:52:46Z/
url https://www.mozilla.org/security/advisories/mfsa2026-24/
13
reference_url https://access.redhat.com/errata/RHSA-2026:5930
reference_id RHSA-2026:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5930
14
reference_url https://access.redhat.com/errata/RHSA-2026:5931
reference_id RHSA-2026:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5931
15
reference_url https://access.redhat.com/errata/RHSA-2026:5932
reference_id RHSA-2026:5932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5932
16
reference_url https://access.redhat.com/errata/RHSA-2026:6188
reference_id RHSA-2026:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6188
17
reference_url https://access.redhat.com/errata/RHSA-2026:6342
reference_id RHSA-2026:6342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6342
18
reference_url https://access.redhat.com/errata/RHSA-2026:6917
reference_id RHSA-2026:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6917
19
reference_url https://access.redhat.com/errata/RHSA-2026:7837
reference_id RHSA-2026:7837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7837
20
reference_url https://access.redhat.com/errata/RHSA-2026:7838
reference_id RHSA-2026:7838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7838
21
reference_url https://access.redhat.com/errata/RHSA-2026:7839
reference_id RHSA-2026:7839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7839
22
reference_url https://access.redhat.com/errata/RHSA-2026:7840
reference_id RHSA-2026:7840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7840
23
reference_url https://access.redhat.com/errata/RHSA-2026:7841
reference_id RHSA-2026:7841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7841
24
reference_url https://access.redhat.com/errata/RHSA-2026:7842
reference_id RHSA-2026:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7842
25
reference_url https://access.redhat.com/errata/RHSA-2026:7843
reference_id RHSA-2026:7843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7843
26
reference_url https://access.redhat.com/errata/RHSA-2026:7845
reference_id RHSA-2026:7845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7845
27
reference_url https://access.redhat.com/errata/RHSA-2026:7858
reference_id RHSA-2026:7858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7858
28
reference_url https://access.redhat.com/errata/RHSA-2026:8284
reference_id RHSA-2026:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8284
29
reference_url https://access.redhat.com/errata/RHSA-2026:8285
reference_id RHSA-2026:8285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8285
30
reference_url https://access.redhat.com/errata/RHSA-2026:8286
reference_id RHSA-2026:8286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8286
31
reference_url https://access.redhat.com/errata/RHSA-2026:8287
reference_id RHSA-2026:8287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8287
32
reference_url https://access.redhat.com/errata/RHSA-2026:8288
reference_id RHSA-2026:8288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8288
33
reference_url https://access.redhat.com/errata/RHSA-2026:8289
reference_id RHSA-2026:8289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8289
34
reference_url https://access.redhat.com/errata/RHSA-2026:8290
reference_id RHSA-2026:8290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8290
35
reference_url https://access.redhat.com/errata/RHSA-2026:8315
reference_id RHSA-2026:8315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8315
36
reference_url https://access.redhat.com/errata/RHSA-2026:8427
reference_id RHSA-2026:8427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8427
37
reference_url https://access.redhat.com/errata/RHSA-2026:8850
reference_id RHSA-2026:8850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8850
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2016370
reference_id show_bug.cgi?id=2016370
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-26T18:52:46Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2016370
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
purl pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1~deb12u1
aliases CVE-2026-4710
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ymak-rv52-h7a5
Fixing_vulnerabilities
0
url VCID-1hay-xe3q-gyb4
vulnerability_id VCID-1hay-xe3q-gyb4
summary Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2789.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2789.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2789
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04533
published_at 2026-04-21T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.1536
published_at 2026-04-07T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15283
published_at 2026-04-18T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15422
published_at 2026-04-12T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15461
published_at 2026-04-11T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15497
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15447
published_at 2026-04-08T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.1556
published_at 2026-04-04T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15489
published_at 2026-04-02T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15276
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15358
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2789
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2789
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442322
reference_id 2442322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442322
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:15:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:15:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:15:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:15:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:15:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2015179
reference_id show_bug.cgi?id=2015179
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:15:58Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2015179
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2789
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1hay-xe3q-gyb4
1
url VCID-1jqj-tqfp-73f7
vulnerability_id VCID-1jqj-tqfp-73f7
summary JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14325.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14325.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14325
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25286
published_at 2026-04-07T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25477
published_at 2026-04-02T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25398
published_at 2026-04-09T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25353
published_at 2026-04-08T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25514
published_at 2026-04-04T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30263
published_at 2026-04-11T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30125
published_at 2026-04-21T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30168
published_at 2026-04-18T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30187
published_at 2026-04-16T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30173
published_at 2026-04-13T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.3022
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14325
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14325
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420504
reference_id 2420504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420504
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T17:04:03Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T17:04:03Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T17:04:03Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T17:04:03Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
13
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
14
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
15
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
16
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
17
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
18
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
19
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
20
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
21
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
22
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
23
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
24
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
25
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
26
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
27
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
28
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
29
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
30
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
31
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
32
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
33
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
34
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
35
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
36
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
37
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1998050
reference_id show_bug.cgi?id=1998050
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T17:04:03Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1998050
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-14325
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jqj-tqfp-73f7
2
url VCID-1u8u-pnq3-t7ae
vulnerability_id VCID-1u8u-pnq3-t7ae
summary Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2757.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2757.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2757
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20416
published_at 2026-04-21T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20418
published_at 2026-04-18T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.20428
published_at 2026-04-13T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.20483
published_at 2026-04-12T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20528
published_at 2026-04-11T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20579
published_at 2026-04-02T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20504
published_at 2026-04-09T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20447
published_at 2026-04-08T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20366
published_at 2026-04-07T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20638
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2757
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2757
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442324
reference_id 2442324
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442324
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:39:17Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:39:17Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:39:17Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:39:17Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:39:17Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2001637
reference_id show_bug.cgi?id=2001637
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:39:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2001637
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2757
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1u8u-pnq3-t7ae
3
url VCID-1v2s-g46y-ybdc
vulnerability_id VCID-1v2s-g46y-ybdc
summary Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2792.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2792.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2792
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.213
published_at 2026-04-21T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21325
published_at 2026-04-18T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21267
published_at 2026-04-07T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21415
published_at 2026-04-11T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21407
published_at 2026-04-09T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21346
published_at 2026-04-08T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21514
published_at 2026-04-04T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21461
published_at 2026-04-02T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21317
published_at 2026-04-16T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21321
published_at 2026-04-13T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21376
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2792
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2792
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442318
reference_id 2442318
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442318
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=2008912%2C2010050%2C2010275%2C2012331
reference_id buglist.cgi?bug_id=2008912%2C2010050%2C2010275%2C2012331
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:57Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=2008912%2C2010050%2C2010275%2C2012331
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
7
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
9
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
11
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
13
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
14
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
15
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
16
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
17
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
18
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
19
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
20
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
21
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
22
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
23
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
24
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
25
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
26
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
27
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
28
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
29
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
30
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
31
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
32
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
33
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
34
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
35
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
36
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
37
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
38
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2792
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1v2s-g46y-ybdc
4
url VCID-3gmj-y8qd-ufej
vulnerability_id VCID-3gmj-y8qd-ufej
summary Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2787.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2787.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2787
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04533
published_at 2026-04-21T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.1536
published_at 2026-04-07T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15283
published_at 2026-04-18T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15422
published_at 2026-04-12T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15461
published_at 2026-04-11T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15497
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15447
published_at 2026-04-08T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.1556
published_at 2026-04-04T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15489
published_at 2026-04-02T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15276
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15358
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2787
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2787
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442297
reference_id 2442297
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442297
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:02:37Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:02:37Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:02:37Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:02:37Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:02:37Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2014560
reference_id show_bug.cgi?id=2014560
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:02:37Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2014560
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2787
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3gmj-y8qd-ufej
5
url VCID-3qfb-sxha-v3cw
vulnerability_id VCID-3qfb-sxha-v3cw
summary Same-origin policy bypass in the Layout component. This vulnerability affects Firefox < 143, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10529.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-10529
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17358
published_at 2026-04-04T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.1731
published_at 2026-04-02T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17265
published_at 2026-04-11T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17286
published_at 2026-04-09T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17229
published_at 2026-04-08T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17137
published_at 2026-04-07T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19446
published_at 2026-04-16T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19485
published_at 2026-04-13T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19454
published_at 2026-04-18T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19467
published_at 2026-04-21T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19544
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-10529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10529
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395756
reference_id 2395756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395756
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
reference_id mfsa2025-73
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
5
reference_url https://www.mozilla.org/security/advisories/mfsa2025-73/
reference_id mfsa2025-73
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T17:44:09Z/
url https://www.mozilla.org/security/advisories/mfsa2025-73/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
reference_id mfsa2025-75
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-75/
reference_id mfsa2025-75
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T17:44:09Z/
url https://www.mozilla.org/security/advisories/mfsa2025-75/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
reference_id mfsa2025-77
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-77/
reference_id mfsa2025-77
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T17:44:09Z/
url https://www.mozilla.org/security/advisories/mfsa2025-77/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
reference_id mfsa2025-78
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-78/
reference_id mfsa2025-78
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T17:44:09Z/
url https://www.mozilla.org/security/advisories/mfsa2025-78/
12
reference_url https://access.redhat.com/errata/RHSA-2025:16108
reference_id RHSA-2025:16108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16108
13
reference_url https://access.redhat.com/errata/RHSA-2025:16109
reference_id RHSA-2025:16109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16109
14
reference_url https://access.redhat.com/errata/RHSA-2025:16156
reference_id RHSA-2025:16156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16156
15
reference_url https://access.redhat.com/errata/RHSA-2025:16157
reference_id RHSA-2025:16157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16157
16
reference_url https://access.redhat.com/errata/RHSA-2025:16260
reference_id RHSA-2025:16260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16260
17
reference_url https://access.redhat.com/errata/RHSA-2025:16589
reference_id RHSA-2025:16589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16589
18
reference_url https://access.redhat.com/errata/RHSA-2025:17340
reference_id RHSA-2025:17340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17340
19
reference_url https://access.redhat.com/errata/RHSA-2025:17341
reference_id RHSA-2025:17341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17341
20
reference_url https://access.redhat.com/errata/RHSA-2025:17342
reference_id RHSA-2025:17342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17342
21
reference_url https://access.redhat.com/errata/RHSA-2025:17343
reference_id RHSA-2025:17343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17343
22
reference_url https://access.redhat.com/errata/RHSA-2025:17344
reference_id RHSA-2025:17344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17344
23
reference_url https://access.redhat.com/errata/RHSA-2025:17345
reference_id RHSA-2025:17345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17345
24
reference_url https://access.redhat.com/errata/RHSA-2025:17346
reference_id RHSA-2025:17346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17346
25
reference_url https://access.redhat.com/errata/RHSA-2025:17367
reference_id RHSA-2025:17367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17367
26
reference_url https://access.redhat.com/errata/RHSA-2025:17368
reference_id RHSA-2025:17368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17368
27
reference_url https://access.redhat.com/errata/RHSA-2025:17371
reference_id RHSA-2025:17371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17371
28
reference_url https://access.redhat.com/errata/RHSA-2025:17372
reference_id RHSA-2025:17372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17372
29
reference_url https://access.redhat.com/errata/RHSA-2025:17373
reference_id RHSA-2025:17373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17373
30
reference_url https://access.redhat.com/errata/RHSA-2025:17374
reference_id RHSA-2025:17374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17374
31
reference_url https://access.redhat.com/errata/RHSA-2025:17378
reference_id RHSA-2025:17378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17378
32
reference_url https://access.redhat.com/errata/RHSA-2025:17453
reference_id RHSA-2025:17453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17453
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1970490
reference_id show_bug.cgi?id=1970490
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T17:44:09Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1970490
34
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-10529
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qfb-sxha-v3cw
6
url VCID-3sg3-9yx7-fufa
vulnerability_id VCID-3sg3-9yx7-fufa
summary Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2790.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2790.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2790
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.06064
published_at 2026-04-21T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05913
published_at 2026-04-18T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05897
published_at 2026-04-07T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05956
published_at 2026-04-11T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05974
published_at 2026-04-09T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05935
published_at 2026-04-08T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05904
published_at 2026-04-04T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.0587
published_at 2026-04-02T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05902
published_at 2026-04-16T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05937
published_at 2026-04-13T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05946
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2790
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2790
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442313
reference_id 2442313
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442313
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:20:32Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:20:32Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:20:32Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:20:32Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2008426
reference_id show_bug.cgi?id=2008426
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:20:32Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2008426
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2790
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3sg3-9yx7-fufa
7
url VCID-4bw1-v6ze-kbds
vulnerability_id VCID-4bw1-v6ze-kbds
summary Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13018.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13018.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13018
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06945
published_at 2026-04-16T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.07023
published_at 2026-04-11T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.07013
published_at 2026-04-12T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.07006
published_at 2026-04-13T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06929
published_at 2026-04-18T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.0734
published_at 2026-04-09T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10136
published_at 2026-04-21T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18762
published_at 2026-04-04T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18708
published_at 2026-04-02T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18559
published_at 2026-04-08T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18478
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13018
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13018
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414079
reference_id 2414079
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414079
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
reference_id mfsa2025-87
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-87/
reference_id mfsa2025-87
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:10:48Z/
url https://www.mozilla.org/security/advisories/mfsa2025-87/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
reference_id mfsa2025-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-88/
reference_id mfsa2025-88
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:10:48Z/
url https://www.mozilla.org/security/advisories/mfsa2025-88/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
reference_id mfsa2025-90
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-90/
reference_id mfsa2025-90
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:10:48Z/
url https://www.mozilla.org/security/advisories/mfsa2025-90/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
reference_id mfsa2025-91
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-91/
reference_id mfsa2025-91
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:10:48Z/
url https://www.mozilla.org/security/advisories/mfsa2025-91/
13
reference_url https://access.redhat.com/errata/RHSA-2025:21120
reference_id RHSA-2025:21120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21120
14
reference_url https://access.redhat.com/errata/RHSA-2025:21121
reference_id RHSA-2025:21121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21121
15
reference_url https://access.redhat.com/errata/RHSA-2025:21280
reference_id RHSA-2025:21280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21280
16
reference_url https://access.redhat.com/errata/RHSA-2025:21281
reference_id RHSA-2025:21281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21281
17
reference_url https://access.redhat.com/errata/RHSA-2025:21841
reference_id RHSA-2025:21841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21841
18
reference_url https://access.redhat.com/errata/RHSA-2025:21842
reference_id RHSA-2025:21842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21842
19
reference_url https://access.redhat.com/errata/RHSA-2025:21843
reference_id RHSA-2025:21843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21843
20
reference_url https://access.redhat.com/errata/RHSA-2025:21844
reference_id RHSA-2025:21844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21844
21
reference_url https://access.redhat.com/errata/RHSA-2025:21881
reference_id RHSA-2025:21881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21881
22
reference_url https://access.redhat.com/errata/RHSA-2025:22363
reference_id RHSA-2025:22363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22363
23
reference_url https://access.redhat.com/errata/RHSA-2025:22367
reference_id RHSA-2025:22367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22367
24
reference_url https://access.redhat.com/errata/RHSA-2025:22368
reference_id RHSA-2025:22368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22368
25
reference_url https://access.redhat.com/errata/RHSA-2025:22369
reference_id RHSA-2025:22369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22369
26
reference_url https://access.redhat.com/errata/RHSA-2025:22371
reference_id RHSA-2025:22371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22371
27
reference_url https://access.redhat.com/errata/RHSA-2025:22372
reference_id RHSA-2025:22372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22372
28
reference_url https://access.redhat.com/errata/RHSA-2025:22373
reference_id RHSA-2025:22373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22373
29
reference_url https://access.redhat.com/errata/RHSA-2025:22374
reference_id RHSA-2025:22374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22374
30
reference_url https://access.redhat.com/errata/RHSA-2025:22375
reference_id RHSA-2025:22375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22375
31
reference_url https://access.redhat.com/errata/RHSA-2025:22449
reference_id RHSA-2025:22449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22449
32
reference_url https://access.redhat.com/errata/RHSA-2025:22450
reference_id RHSA-2025:22450
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22450
33
reference_url https://access.redhat.com/errata/RHSA-2025:22451
reference_id RHSA-2025:22451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22451
34
reference_url https://access.redhat.com/errata/RHSA-2025:22791
reference_id RHSA-2025:22791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22791
35
reference_url https://access.redhat.com/errata/RHSA-2025:22792
reference_id RHSA-2025:22792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22792
36
reference_url https://access.redhat.com/errata/RHSA-2025:22882
reference_id RHSA-2025:22882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22882
37
reference_url https://access.redhat.com/errata/RHSA-2025:22883
reference_id RHSA-2025:22883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22883
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1984940
reference_id show_bug.cgi?id=1984940
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:10:48Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1984940
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-13018
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4bw1-v6ze-kbds
8
url VCID-4g7u-xmdq-mkdn
vulnerability_id VCID-4g7u-xmdq-mkdn
summary Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14328.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14328.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14328
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16329
published_at 2026-04-07T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.1647
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16473
published_at 2026-04-09T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16415
published_at 2026-04-08T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16532
published_at 2026-04-04T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22459
published_at 2026-04-16T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22404
published_at 2026-04-21T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22456
published_at 2026-04-18T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22498
published_at 2026-04-12T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22443
published_at 2026-04-13T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22539
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14328
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14328
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14328
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420508
reference_id 2420508
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420508
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
13
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
14
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
15
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
16
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
17
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
18
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
19
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
20
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
21
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
22
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
23
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
24
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
25
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
26
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
27
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
28
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
29
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
30
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
31
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
32
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
33
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
34
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
35
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
36
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
37
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1996761
reference_id show_bug.cgi?id=1996761
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1996761
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-14328
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4g7u-xmdq-mkdn
9
url VCID-4gsx-puz4-a3f1
vulnerability_id VCID-4gsx-puz4-a3f1
summary Use-after-free in MediaTrackGraphImpl::GetInstance()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11708.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11708.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11708
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24103
published_at 2026-04-21T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24127
published_at 2026-04-18T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24141
published_at 2026-04-16T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24276
published_at 2026-04-02T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24126
published_at 2026-04-13T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24182
published_at 2026-04-12T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24224
published_at 2026-04-11T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24207
published_at 2026-04-09T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24096
published_at 2026-04-07T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.24162
published_at 2026-04-08T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24309
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11708
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11708
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403769
reference_id 2403769
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403769
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
reference_id mfsa2025-81
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
5
reference_url https://www.mozilla.org/security/advisories/mfsa2025-81/
reference_id mfsa2025-81
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:05Z/
url https://www.mozilla.org/security/advisories/mfsa2025-81/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
reference_id mfsa2025-83
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-83/
reference_id mfsa2025-83
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:05Z/
url https://www.mozilla.org/security/advisories/mfsa2025-83/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
reference_id mfsa2025-84
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-84/
reference_id mfsa2025-84
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:05Z/
url https://www.mozilla.org/security/advisories/mfsa2025-84/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
reference_id mfsa2025-85
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-85/
reference_id mfsa2025-85
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:05Z/
url https://www.mozilla.org/security/advisories/mfsa2025-85/
12
reference_url https://access.redhat.com/errata/RHSA-2025:18154
reference_id RHSA-2025:18154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18154
13
reference_url https://access.redhat.com/errata/RHSA-2025:18155
reference_id RHSA-2025:18155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18155
14
reference_url https://access.redhat.com/errata/RHSA-2025:18285
reference_id RHSA-2025:18285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18285
15
reference_url https://access.redhat.com/errata/RHSA-2025:18320
reference_id RHSA-2025:18320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18320
16
reference_url https://access.redhat.com/errata/RHSA-2025:18321
reference_id RHSA-2025:18321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18321
17
reference_url https://access.redhat.com/errata/RHSA-2025:18983
reference_id RHSA-2025:18983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18983
18
reference_url https://access.redhat.com/errata/RHSA-2025:19278
reference_id RHSA-2025:19278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19278
19
reference_url https://access.redhat.com/errata/RHSA-2025:19938
reference_id RHSA-2025:19938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19938
20
reference_url https://access.redhat.com/errata/RHSA-2025:19939
reference_id RHSA-2025:19939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19939
21
reference_url https://access.redhat.com/errata/RHSA-2025:19941
reference_id RHSA-2025:19941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19941
22
reference_url https://access.redhat.com/errata/RHSA-2025:19942
reference_id RHSA-2025:19942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19942
23
reference_url https://access.redhat.com/errata/RHSA-2025:19943
reference_id RHSA-2025:19943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19943
24
reference_url https://access.redhat.com/errata/RHSA-2025:19944
reference_id RHSA-2025:19944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19944
25
reference_url https://access.redhat.com/errata/RHSA-2025:19945
reference_id RHSA-2025:19945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19945
26
reference_url https://access.redhat.com/errata/RHSA-2025:21054
reference_id RHSA-2025:21054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21054
27
reference_url https://access.redhat.com/errata/RHSA-2025:21055
reference_id RHSA-2025:21055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21055
28
reference_url https://access.redhat.com/errata/RHSA-2025:21056
reference_id RHSA-2025:21056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21056
29
reference_url https://access.redhat.com/errata/RHSA-2025:21057
reference_id RHSA-2025:21057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21057
30
reference_url https://access.redhat.com/errata/RHSA-2025:21058
reference_id RHSA-2025:21058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21058
31
reference_url https://access.redhat.com/errata/RHSA-2025:21059
reference_id RHSA-2025:21059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21059
32
reference_url https://access.redhat.com/errata/RHSA-2025:21064
reference_id RHSA-2025:21064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21064
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1988931
reference_id show_bug.cgi?id=1988931
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:05Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1988931
34
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-11708
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gsx-puz4-a3f1
10
url VCID-4kd3-95cm-g3fc
vulnerability_id VCID-4kd3-95cm-g3fc
summary Same-origin policy bypass in the DOM: Workers component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13019.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13019.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13019
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.07023
published_at 2026-04-11T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.07013
published_at 2026-04-12T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06945
published_at 2026-04-16T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.07006
published_at 2026-04-13T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06929
published_at 2026-04-18T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.0734
published_at 2026-04-09T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10136
published_at 2026-04-21T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18762
published_at 2026-04-04T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18708
published_at 2026-04-02T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18559
published_at 2026-04-08T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18478
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13019
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13019
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414084
reference_id 2414084
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414084
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
reference_id mfsa2025-87
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-87/
reference_id mfsa2025-87
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T14:59:56Z/
url https://www.mozilla.org/security/advisories/mfsa2025-87/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
reference_id mfsa2025-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-88/
reference_id mfsa2025-88
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T14:59:56Z/
url https://www.mozilla.org/security/advisories/mfsa2025-88/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
reference_id mfsa2025-90
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-90/
reference_id mfsa2025-90
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T14:59:56Z/
url https://www.mozilla.org/security/advisories/mfsa2025-90/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
reference_id mfsa2025-91
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-91/
reference_id mfsa2025-91
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T14:59:56Z/
url https://www.mozilla.org/security/advisories/mfsa2025-91/
13
reference_url https://access.redhat.com/errata/RHSA-2025:21120
reference_id RHSA-2025:21120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21120
14
reference_url https://access.redhat.com/errata/RHSA-2025:21121
reference_id RHSA-2025:21121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21121
15
reference_url https://access.redhat.com/errata/RHSA-2025:21280
reference_id RHSA-2025:21280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21280
16
reference_url https://access.redhat.com/errata/RHSA-2025:21281
reference_id RHSA-2025:21281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21281
17
reference_url https://access.redhat.com/errata/RHSA-2025:21841
reference_id RHSA-2025:21841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21841
18
reference_url https://access.redhat.com/errata/RHSA-2025:21842
reference_id RHSA-2025:21842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21842
19
reference_url https://access.redhat.com/errata/RHSA-2025:21843
reference_id RHSA-2025:21843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21843
20
reference_url https://access.redhat.com/errata/RHSA-2025:21844
reference_id RHSA-2025:21844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21844
21
reference_url https://access.redhat.com/errata/RHSA-2025:21881
reference_id RHSA-2025:21881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21881
22
reference_url https://access.redhat.com/errata/RHSA-2025:22363
reference_id RHSA-2025:22363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22363
23
reference_url https://access.redhat.com/errata/RHSA-2025:22367
reference_id RHSA-2025:22367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22367
24
reference_url https://access.redhat.com/errata/RHSA-2025:22368
reference_id RHSA-2025:22368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22368
25
reference_url https://access.redhat.com/errata/RHSA-2025:22369
reference_id RHSA-2025:22369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22369
26
reference_url https://access.redhat.com/errata/RHSA-2025:22371
reference_id RHSA-2025:22371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22371
27
reference_url https://access.redhat.com/errata/RHSA-2025:22372
reference_id RHSA-2025:22372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22372
28
reference_url https://access.redhat.com/errata/RHSA-2025:22373
reference_id RHSA-2025:22373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22373
29
reference_url https://access.redhat.com/errata/RHSA-2025:22374
reference_id RHSA-2025:22374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22374
30
reference_url https://access.redhat.com/errata/RHSA-2025:22375
reference_id RHSA-2025:22375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22375
31
reference_url https://access.redhat.com/errata/RHSA-2025:22449
reference_id RHSA-2025:22449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22449
32
reference_url https://access.redhat.com/errata/RHSA-2025:22450
reference_id RHSA-2025:22450
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22450
33
reference_url https://access.redhat.com/errata/RHSA-2025:22451
reference_id RHSA-2025:22451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22451
34
reference_url https://access.redhat.com/errata/RHSA-2025:22791
reference_id RHSA-2025:22791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22791
35
reference_url https://access.redhat.com/errata/RHSA-2025:22792
reference_id RHSA-2025:22792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22792
36
reference_url https://access.redhat.com/errata/RHSA-2025:22882
reference_id RHSA-2025:22882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22882
37
reference_url https://access.redhat.com/errata/RHSA-2025:22883
reference_id RHSA-2025:22883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22883
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1988412
reference_id show_bug.cgi?id=1988412
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T14:59:56Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1988412
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-13019
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4kd3-95cm-g3fc
11
url VCID-4xqc-36jb-63c2
vulnerability_id VCID-4xqc-36jb-63c2
summary Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2786.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2786.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2786
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.0438
published_at 2026-04-21T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15044
published_at 2026-04-07T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.14964
published_at 2026-04-18T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15153
published_at 2026-04-11T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15183
published_at 2026-04-09T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15132
published_at 2026-04-08T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15239
published_at 2026-04-04T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15172
published_at 2026-04-02T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14955
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15055
published_at 2026-04-13T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15116
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2786
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2786
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442320
reference_id 2442320
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442320
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:03:48Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:03:48Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:03:48Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:03:48Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2013612
reference_id show_bug.cgi?id=2013612
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:03:48Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2013612
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2786
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xqc-36jb-63c2
12
url VCID-59wd-mtjt-4ban
vulnerability_id VCID-59wd-mtjt-4ban
summary Memory safety bugs present in Firefox ESR 115.28, Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11714.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11714.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11714
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17421
published_at 2026-04-21T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17389
published_at 2026-04-18T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.1738
published_at 2026-04-16T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17374
published_at 2026-04-07T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17526
published_at 2026-04-09T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17466
published_at 2026-04-08T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17593
published_at 2026-04-04T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17547
published_at 2026-04-02T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17437
published_at 2026-04-13T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.1749
published_at 2026-04-12T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17539
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11714
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11714
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403763
reference_id 2403763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403763
4
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1973699%2C1989945%2C1990970%2C1991040%2C1992113
reference_id buglist.cgi?bug_id=1973699%2C1989945%2C1990970%2C1991040%2C1992113
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:19Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:27:15Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1973699%2C1989945%2C1990970%2C1991040%2C1992113
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
reference_id mfsa2025-81
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-81/
reference_id mfsa2025-81
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:27:15Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:19Z/
url https://www.mozilla.org/security/advisories/mfsa2025-81/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-82
reference_id mfsa2025-82
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-82
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-82/
reference_id mfsa2025-82
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:19Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:27:15Z/
url https://www.mozilla.org/security/advisories/mfsa2025-82/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
reference_id mfsa2025-83
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-83/
reference_id mfsa2025-83
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:27:15Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:19Z/
url https://www.mozilla.org/security/advisories/mfsa2025-83/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
reference_id mfsa2025-84
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-84/
reference_id mfsa2025-84
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:19Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:27:15Z/
url https://www.mozilla.org/security/advisories/mfsa2025-84/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
reference_id mfsa2025-85
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-85/
reference_id mfsa2025-85
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:19Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:27:15Z/
url https://www.mozilla.org/security/advisories/mfsa2025-85/
15
reference_url https://access.redhat.com/errata/RHSA-2025:18154
reference_id RHSA-2025:18154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18154
16
reference_url https://access.redhat.com/errata/RHSA-2025:18155
reference_id RHSA-2025:18155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18155
17
reference_url https://access.redhat.com/errata/RHSA-2025:18285
reference_id RHSA-2025:18285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18285
18
reference_url https://access.redhat.com/errata/RHSA-2025:18320
reference_id RHSA-2025:18320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18320
19
reference_url https://access.redhat.com/errata/RHSA-2025:18321
reference_id RHSA-2025:18321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18321
20
reference_url https://access.redhat.com/errata/RHSA-2025:18983
reference_id RHSA-2025:18983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18983
21
reference_url https://access.redhat.com/errata/RHSA-2025:19278
reference_id RHSA-2025:19278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19278
22
reference_url https://access.redhat.com/errata/RHSA-2025:19938
reference_id RHSA-2025:19938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19938
23
reference_url https://access.redhat.com/errata/RHSA-2025:19939
reference_id RHSA-2025:19939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19939
24
reference_url https://access.redhat.com/errata/RHSA-2025:19941
reference_id RHSA-2025:19941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19941
25
reference_url https://access.redhat.com/errata/RHSA-2025:19942
reference_id RHSA-2025:19942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19942
26
reference_url https://access.redhat.com/errata/RHSA-2025:19943
reference_id RHSA-2025:19943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19943
27
reference_url https://access.redhat.com/errata/RHSA-2025:19944
reference_id RHSA-2025:19944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19944
28
reference_url https://access.redhat.com/errata/RHSA-2025:19945
reference_id RHSA-2025:19945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19945
29
reference_url https://access.redhat.com/errata/RHSA-2025:21054
reference_id RHSA-2025:21054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21054
30
reference_url https://access.redhat.com/errata/RHSA-2025:21055
reference_id RHSA-2025:21055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21055
31
reference_url https://access.redhat.com/errata/RHSA-2025:21056
reference_id RHSA-2025:21056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21056
32
reference_url https://access.redhat.com/errata/RHSA-2025:21057
reference_id RHSA-2025:21057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21057
33
reference_url https://access.redhat.com/errata/RHSA-2025:21058
reference_id RHSA-2025:21058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21058
34
reference_url https://access.redhat.com/errata/RHSA-2025:21059
reference_id RHSA-2025:21059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21059
35
reference_url https://access.redhat.com/errata/RHSA-2025:21064
reference_id RHSA-2025:21064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21064
36
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-11714
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-59wd-mtjt-4ban
13
url VCID-5ept-fu7g-8kes
vulnerability_id VCID-5ept-fu7g-8kes
summary Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2780.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2780
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04119
published_at 2026-04-21T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03994
published_at 2026-04-18T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04043
published_at 2026-04-07T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.0404
published_at 2026-04-11T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04067
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04048
published_at 2026-04-08T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04029
published_at 2026-04-04T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04011
published_at 2026-04-02T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.03982
published_at 2026-04-16T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.03999
published_at 2026-04-13T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04026
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2780
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2780
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442334
reference_id 2442334
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442334
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:56:05Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:56:05Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:56:05Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:56:05Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2007829
reference_id show_bug.cgi?id=2007829
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:56:05Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2007829
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2780
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ept-fu7g-8kes
14
url VCID-5kwn-x8e4-ukgq
vulnerability_id VCID-5kwn-x8e4-ukgq
summary Memory safety bugs present in Firefox ESR 140.5, Thunderbird ESR 140.5, Firefox 145 and Thunderbird 145. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14333.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14333.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14333
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20569
published_at 2026-04-07T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20797
published_at 2026-04-02T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20707
published_at 2026-04-09T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20646
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20855
published_at 2026-04-04T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24922
published_at 2026-04-11T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.2481
published_at 2026-04-21T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24832
published_at 2026-04-18T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24839
published_at 2026-04-16T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24828
published_at 2026-04-13T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24883
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14333
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14333
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420502
reference_id 2420502
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420502
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1966501%2C1997639
reference_id buglist.cgi?bug_id=1966501%2C1997639
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:13Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1966501%2C1997639
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:13Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:13Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:13Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
13
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:13Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
14
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
15
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
16
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
17
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
18
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
19
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
20
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
21
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
22
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
23
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
24
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
25
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
26
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
27
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
28
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
29
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
30
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
31
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
32
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
33
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
34
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
35
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
36
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
37
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
38
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-14333
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5kwn-x8e4-ukgq
15
url VCID-66z1-8zeg-9qh1
vulnerability_id VCID-66z1-8zeg-9qh1
summary Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component. This vulnerability affects Firefox < 143, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10528.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10528.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-10528
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.2365
published_at 2026-04-04T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23612
published_at 2026-04-02T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23566
published_at 2026-04-11T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23548
published_at 2026-04-09T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23499
published_at 2026-04-08T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23428
published_at 2026-04-07T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25929
published_at 2026-04-16T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25924
published_at 2026-04-13T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.2591
published_at 2026-04-18T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25881
published_at 2026-04-21T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25982
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-10528
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10528
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395755
reference_id 2395755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395755
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
reference_id mfsa2025-73
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
5
reference_url https://www.mozilla.org/security/advisories/mfsa2025-73/
reference_id mfsa2025-73
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T18:02:06Z/
url https://www.mozilla.org/security/advisories/mfsa2025-73/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
reference_id mfsa2025-75
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-75/
reference_id mfsa2025-75
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T18:02:06Z/
url https://www.mozilla.org/security/advisories/mfsa2025-75/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
reference_id mfsa2025-77
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-77/
reference_id mfsa2025-77
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T18:02:06Z/
url https://www.mozilla.org/security/advisories/mfsa2025-77/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
reference_id mfsa2025-78
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-78/
reference_id mfsa2025-78
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T18:02:06Z/
url https://www.mozilla.org/security/advisories/mfsa2025-78/
12
reference_url https://access.redhat.com/errata/RHSA-2025:16108
reference_id RHSA-2025:16108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16108
13
reference_url https://access.redhat.com/errata/RHSA-2025:16109
reference_id RHSA-2025:16109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16109
14
reference_url https://access.redhat.com/errata/RHSA-2025:16156
reference_id RHSA-2025:16156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16156
15
reference_url https://access.redhat.com/errata/RHSA-2025:16157
reference_id RHSA-2025:16157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16157
16
reference_url https://access.redhat.com/errata/RHSA-2025:16260
reference_id RHSA-2025:16260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16260
17
reference_url https://access.redhat.com/errata/RHSA-2025:16589
reference_id RHSA-2025:16589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16589
18
reference_url https://access.redhat.com/errata/RHSA-2025:17340
reference_id RHSA-2025:17340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17340
19
reference_url https://access.redhat.com/errata/RHSA-2025:17341
reference_id RHSA-2025:17341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17341
20
reference_url https://access.redhat.com/errata/RHSA-2025:17342
reference_id RHSA-2025:17342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17342
21
reference_url https://access.redhat.com/errata/RHSA-2025:17343
reference_id RHSA-2025:17343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17343
22
reference_url https://access.redhat.com/errata/RHSA-2025:17344
reference_id RHSA-2025:17344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17344
23
reference_url https://access.redhat.com/errata/RHSA-2025:17345
reference_id RHSA-2025:17345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17345
24
reference_url https://access.redhat.com/errata/RHSA-2025:17346
reference_id RHSA-2025:17346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17346
25
reference_url https://access.redhat.com/errata/RHSA-2025:17367
reference_id RHSA-2025:17367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17367
26
reference_url https://access.redhat.com/errata/RHSA-2025:17368
reference_id RHSA-2025:17368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17368
27
reference_url https://access.redhat.com/errata/RHSA-2025:17371
reference_id RHSA-2025:17371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17371
28
reference_url https://access.redhat.com/errata/RHSA-2025:17372
reference_id RHSA-2025:17372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17372
29
reference_url https://access.redhat.com/errata/RHSA-2025:17373
reference_id RHSA-2025:17373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17373
30
reference_url https://access.redhat.com/errata/RHSA-2025:17374
reference_id RHSA-2025:17374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17374
31
reference_url https://access.redhat.com/errata/RHSA-2025:17378
reference_id RHSA-2025:17378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17378
32
reference_url https://access.redhat.com/errata/RHSA-2025:17453
reference_id RHSA-2025:17453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17453
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1986185
reference_id show_bug.cgi?id=1986185
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T18:02:06Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1986185
34
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-10528
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-66z1-8zeg-9qh1
16
url VCID-6cx1-8t9m-u3av
vulnerability_id VCID-6cx1-8t9m-u3av
summary Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0886.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0886.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0886
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04688
published_at 2026-04-21T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04551
published_at 2026-04-18T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04544
published_at 2026-04-04T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04582
published_at 2026-04-12T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04599
published_at 2026-04-11T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04609
published_at 2026-04-09T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04594
published_at 2026-04-08T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04559
published_at 2026-04-07T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04521
published_at 2026-04-02T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04541
published_at 2026-04-16T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04566
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0886
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0886
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2428978
reference_id 2428978
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2428978
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
reference_id mfsa2026-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-01/
reference_id mfsa2026-01
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T20:27:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-01/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-02
reference_id mfsa2026-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-02
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-02/
reference_id mfsa2026-02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T20:27:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-02/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T20:27:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
reference_id mfsa2026-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-04/
reference_id mfsa2026-04
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T20:27:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-04/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T20:27:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
15
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
16
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
17
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
18
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
19
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
20
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
21
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
22
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
23
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
24
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
25
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
26
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
27
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
28
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
29
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
30
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
31
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
32
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
33
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
34
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
35
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
36
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
37
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2005658
reference_id show_bug.cgi?id=2005658
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T20:27:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2005658
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-0886
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6cx1-8t9m-u3av
17
url VCID-6fsa-bnes-tkff
vulnerability_id VCID-6fsa-bnes-tkff
summary Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2765.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2765.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2765
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06304
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.0615
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06121
published_at 2026-04-07T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06192
published_at 2026-04-11T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06201
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06164
published_at 2026-04-08T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06137
published_at 2026-04-04T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06107
published_at 2026-04-02T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06138
published_at 2026-04-16T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06179
published_at 2026-04-13T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06187
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2765
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2765
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442333
reference_id 2442333
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442333
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:30:09Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:30:09Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:30:09Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:30:09Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2013562
reference_id show_bug.cgi?id=2013562
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:30:09Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2013562
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2765
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fsa-bnes-tkff
18
url VCID-6jw1-pere-ruee
vulnerability_id VCID-6jw1-pere-ruee
summary Memory safety bugs present in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11715.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11715.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11715
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.1823
published_at 2026-04-21T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18203
published_at 2026-04-18T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.1819
published_at 2026-04-16T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18442
published_at 2026-04-02T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18497
published_at 2026-04-04T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18289
published_at 2026-04-08T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18206
published_at 2026-04-07T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18245
published_at 2026-04-13T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18296
published_at 2026-04-12T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18343
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11715
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11715
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403774
reference_id 2403774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403774
4
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1983838%2C1987624%2C1988244%2C1988912%2C1989734%2C1990085%2C1991899
reference_id buglist.cgi?bug_id=1983838%2C1987624%2C1988244%2C1988912%2C1989734%2C1990085%2C1991899
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:16Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1983838%2C1987624%2C1988244%2C1988912%2C1989734%2C1990085%2C1991899
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
reference_id mfsa2025-81
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-81/
reference_id mfsa2025-81
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:16Z/
url https://www.mozilla.org/security/advisories/mfsa2025-81/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
reference_id mfsa2025-83
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-83/
reference_id mfsa2025-83
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:16Z/
url https://www.mozilla.org/security/advisories/mfsa2025-83/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
reference_id mfsa2025-84
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-84/
reference_id mfsa2025-84
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:16Z/
url https://www.mozilla.org/security/advisories/mfsa2025-84/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
reference_id mfsa2025-85
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-85/
reference_id mfsa2025-85
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:16Z/
url https://www.mozilla.org/security/advisories/mfsa2025-85/
13
reference_url https://access.redhat.com/errata/RHSA-2025:18154
reference_id RHSA-2025:18154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18154
14
reference_url https://access.redhat.com/errata/RHSA-2025:18155
reference_id RHSA-2025:18155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18155
15
reference_url https://access.redhat.com/errata/RHSA-2025:18285
reference_id RHSA-2025:18285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18285
16
reference_url https://access.redhat.com/errata/RHSA-2025:18320
reference_id RHSA-2025:18320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18320
17
reference_url https://access.redhat.com/errata/RHSA-2025:18321
reference_id RHSA-2025:18321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18321
18
reference_url https://access.redhat.com/errata/RHSA-2025:18983
reference_id RHSA-2025:18983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18983
19
reference_url https://access.redhat.com/errata/RHSA-2025:19278
reference_id RHSA-2025:19278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19278
20
reference_url https://access.redhat.com/errata/RHSA-2025:19938
reference_id RHSA-2025:19938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19938
21
reference_url https://access.redhat.com/errata/RHSA-2025:19939
reference_id RHSA-2025:19939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19939
22
reference_url https://access.redhat.com/errata/RHSA-2025:19941
reference_id RHSA-2025:19941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19941
23
reference_url https://access.redhat.com/errata/RHSA-2025:19942
reference_id RHSA-2025:19942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19942
24
reference_url https://access.redhat.com/errata/RHSA-2025:19943
reference_id RHSA-2025:19943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19943
25
reference_url https://access.redhat.com/errata/RHSA-2025:19944
reference_id RHSA-2025:19944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19944
26
reference_url https://access.redhat.com/errata/RHSA-2025:19945
reference_id RHSA-2025:19945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19945
27
reference_url https://access.redhat.com/errata/RHSA-2025:21054
reference_id RHSA-2025:21054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21054
28
reference_url https://access.redhat.com/errata/RHSA-2025:21055
reference_id RHSA-2025:21055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21055
29
reference_url https://access.redhat.com/errata/RHSA-2025:21056
reference_id RHSA-2025:21056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21056
30
reference_url https://access.redhat.com/errata/RHSA-2025:21057
reference_id RHSA-2025:21057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21057
31
reference_url https://access.redhat.com/errata/RHSA-2025:21058
reference_id RHSA-2025:21058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21058
32
reference_url https://access.redhat.com/errata/RHSA-2025:21059
reference_id RHSA-2025:21059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21059
33
reference_url https://access.redhat.com/errata/RHSA-2025:21064
reference_id RHSA-2025:21064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21064
34
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-11715
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6jw1-pere-ruee
19
url VCID-7wmw-hpfw-vuaa
vulnerability_id VCID-7wmw-hpfw-vuaa
summary Sandbox escape in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2761.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2761
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.33974
published_at 2026-04-21T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.34007
published_at 2026-04-18T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.33981
published_at 2026-04-07T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.3401
published_at 2026-04-12T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.34053
published_at 2026-04-11T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.34054
published_at 2026-04-09T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.34023
published_at 2026-04-08T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.34121
published_at 2026-04-04T12:55:00Z
8
value 0.00139
scoring_system epss
scoring_elements 0.34089
published_at 2026-04-02T12:55:00Z
9
value 0.00139
scoring_system epss
scoring_elements 0.3402
published_at 2026-04-16T12:55:00Z
10
value 0.00139
scoring_system epss
scoring_elements 0.33986
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2761
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442309
reference_id 2442309
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442309
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:52:27Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:52:27Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:52:27Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:52:27Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:52:27Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2011063
reference_id show_bug.cgi?id=2011063
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:52:27Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2011063
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2761
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wmw-hpfw-vuaa
20
url VCID-84jf-84jx-3fgj
vulnerability_id VCID-84jf-84jx-3fgj
summary Privilege escalation in the DOM: Notifications component. This vulnerability affects Firefox < 146, Firefox ESR < 115.31, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14323.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14323.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14323
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16898
published_at 2026-04-04T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16841
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16821
published_at 2026-04-09T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16767
published_at 2026-04-08T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16682
published_at 2026-04-07T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22712
published_at 2026-04-13T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22807
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22728
published_at 2026-04-16T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22769
published_at 2026-04-12T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22683
published_at 2026-04-21T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22724
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14323
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14323
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420513
reference_id 2420513
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420513
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:12Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
reference_id mfsa2025-93
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-93/
reference_id mfsa2025-93
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:12Z/
url https://www.mozilla.org/security/advisories/mfsa2025-93/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:12Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:12Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:12Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
15
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
16
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
17
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
18
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
19
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
20
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
21
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
22
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
23
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
24
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
25
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
26
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
27
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
28
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
29
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
30
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
31
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
32
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
33
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
34
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
35
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
36
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
37
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
38
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
39
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1996555
reference_id show_bug.cgi?id=1996555
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:12Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1996555
41
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-14323
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-84jf-84jx-3fgj
21
url VCID-8u4y-zrhv-8fe9
vulnerability_id VCID-8u4y-zrhv-8fe9
summary Clickjacking issue, information disclosure in the PDF Viewer component. This vulnerability affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0887.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0887.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0887
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02816
published_at 2026-04-21T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02701
published_at 2026-04-18T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02729
published_at 2026-04-04T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.0273
published_at 2026-04-11T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02759
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02739
published_at 2026-04-08T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02737
published_at 2026-04-07T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02714
published_at 2026-04-12T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02691
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02711
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0887
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0887
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0887
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2428972
reference_id 2428972
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2428972
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
reference_id mfsa2026-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-01/
reference_id mfsa2026-01
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T15:32:40Z/
url https://www.mozilla.org/security/advisories/mfsa2026-01/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T15:32:40Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
reference_id mfsa2026-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-04/
reference_id mfsa2026-04
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T15:32:40Z/
url https://www.mozilla.org/security/advisories/mfsa2026-04/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T15:32:40Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
13
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
14
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
15
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
16
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
17
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
18
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
19
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
20
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
21
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
22
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
23
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
24
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
25
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
26
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
27
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
28
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
29
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
30
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
31
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
32
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
33
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
34
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
35
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
36
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2006500
reference_id show_bug.cgi?id=2006500
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T15:32:40Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2006500
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-0887
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8u4y-zrhv-8fe9
22
url VCID-8zy6-g8kn-hbdc
vulnerability_id VCID-8zy6-g8kn-hbdc
summary Mitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2775.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2775.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2775
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07695
published_at 2026-04-21T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07555
published_at 2026-04-18T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07592
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07657
published_at 2026-04-12T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.0767
published_at 2026-04-11T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07669
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07651
published_at 2026-04-08T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07619
published_at 2026-04-04T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07576
published_at 2026-04-02T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07567
published_at 2026-04-16T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07642
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2775
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2775
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442314
reference_id 2442314
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442314
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:20:30Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:20:30Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:20:30Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:20:30Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:20:30Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2015199
reference_id show_bug.cgi?id=2015199
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:20:30Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2015199
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2775
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8zy6-g8kn-hbdc
23
url VCID-93au-w2zh-3yhg
vulnerability_id VCID-93au-w2zh-3yhg
summary Integer overflow in the SVG component. This vulnerability affects Firefox < 143, Firefox ESR < 115.28, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10533.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-10533
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24553
published_at 2026-04-04T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24518
published_at 2026-04-02T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24463
published_at 2026-04-11T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24448
published_at 2026-04-09T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24403
published_at 2026-04-08T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24335
published_at 2026-04-07T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26524
published_at 2026-04-16T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26459
published_at 2026-04-21T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26574
published_at 2026-04-12T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26497
published_at 2026-04-18T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26517
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-10533
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10533
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395766
reference_id 2395766
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395766
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
reference_id mfsa2025-73
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
5
reference_url https://www.mozilla.org/security/advisories/mfsa2025-73/
reference_id mfsa2025-73
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:44:57Z/
url https://www.mozilla.org/security/advisories/mfsa2025-73/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-74
reference_id mfsa2025-74
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-74
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-74/
reference_id mfsa2025-74
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:44:57Z/
url https://www.mozilla.org/security/advisories/mfsa2025-74/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
reference_id mfsa2025-75
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-75/
reference_id mfsa2025-75
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:44:57Z/
url https://www.mozilla.org/security/advisories/mfsa2025-75/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
reference_id mfsa2025-77
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-77/
reference_id mfsa2025-77
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:44:57Z/
url https://www.mozilla.org/security/advisories/mfsa2025-77/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
reference_id mfsa2025-78
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
13
reference_url https://www.mozilla.org/security/advisories/mfsa2025-78/
reference_id mfsa2025-78
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:44:57Z/
url https://www.mozilla.org/security/advisories/mfsa2025-78/
14
reference_url https://access.redhat.com/errata/RHSA-2025:16108
reference_id RHSA-2025:16108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16108
15
reference_url https://access.redhat.com/errata/RHSA-2025:16109
reference_id RHSA-2025:16109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16109
16
reference_url https://access.redhat.com/errata/RHSA-2025:16156
reference_id RHSA-2025:16156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16156
17
reference_url https://access.redhat.com/errata/RHSA-2025:16157
reference_id RHSA-2025:16157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16157
18
reference_url https://access.redhat.com/errata/RHSA-2025:16260
reference_id RHSA-2025:16260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16260
19
reference_url https://access.redhat.com/errata/RHSA-2025:16589
reference_id RHSA-2025:16589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16589
20
reference_url https://access.redhat.com/errata/RHSA-2025:17340
reference_id RHSA-2025:17340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17340
21
reference_url https://access.redhat.com/errata/RHSA-2025:17341
reference_id RHSA-2025:17341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17341
22
reference_url https://access.redhat.com/errata/RHSA-2025:17342
reference_id RHSA-2025:17342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17342
23
reference_url https://access.redhat.com/errata/RHSA-2025:17343
reference_id RHSA-2025:17343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17343
24
reference_url https://access.redhat.com/errata/RHSA-2025:17344
reference_id RHSA-2025:17344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17344
25
reference_url https://access.redhat.com/errata/RHSA-2025:17345
reference_id RHSA-2025:17345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17345
26
reference_url https://access.redhat.com/errata/RHSA-2025:17346
reference_id RHSA-2025:17346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17346
27
reference_url https://access.redhat.com/errata/RHSA-2025:17367
reference_id RHSA-2025:17367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17367
28
reference_url https://access.redhat.com/errata/RHSA-2025:17368
reference_id RHSA-2025:17368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17368
29
reference_url https://access.redhat.com/errata/RHSA-2025:17371
reference_id RHSA-2025:17371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17371
30
reference_url https://access.redhat.com/errata/RHSA-2025:17372
reference_id RHSA-2025:17372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17372
31
reference_url https://access.redhat.com/errata/RHSA-2025:17373
reference_id RHSA-2025:17373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17373
32
reference_url https://access.redhat.com/errata/RHSA-2025:17374
reference_id RHSA-2025:17374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17374
33
reference_url https://access.redhat.com/errata/RHSA-2025:17378
reference_id RHSA-2025:17378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17378
34
reference_url https://access.redhat.com/errata/RHSA-2025:17453
reference_id RHSA-2025:17453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17453
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1980788
reference_id show_bug.cgi?id=1980788
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:44:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1980788
36
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-10533
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-93au-w2zh-3yhg
24
url VCID-962a-dwqf-3ycg
vulnerability_id VCID-962a-dwqf-3ycg
summary Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13016.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13016.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13016
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09765
published_at 2026-04-21T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14709
published_at 2026-04-11T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14672
published_at 2026-04-12T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14508
published_at 2026-04-16T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14617
published_at 2026-04-13T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14515
published_at 2026-04-18T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.1536
published_at 2026-04-09T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23745
published_at 2026-04-04T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23702
published_at 2026-04-02T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23596
published_at 2026-04-08T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23525
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13016
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13016
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414083
reference_id 2414083
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414083
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
reference_id mfsa2025-87
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-87/
reference_id mfsa2025-87
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-13T15:12:45Z/
url https://www.mozilla.org/security/advisories/mfsa2025-87/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
reference_id mfsa2025-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-88/
reference_id mfsa2025-88
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-13T15:12:45Z/
url https://www.mozilla.org/security/advisories/mfsa2025-88/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
reference_id mfsa2025-90
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-90/
reference_id mfsa2025-90
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-13T15:12:45Z/
url https://www.mozilla.org/security/advisories/mfsa2025-90/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
reference_id mfsa2025-91
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-91/
reference_id mfsa2025-91
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-13T15:12:45Z/
url https://www.mozilla.org/security/advisories/mfsa2025-91/
13
reference_url https://access.redhat.com/errata/RHSA-2025:21120
reference_id RHSA-2025:21120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21120
14
reference_url https://access.redhat.com/errata/RHSA-2025:21121
reference_id RHSA-2025:21121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21121
15
reference_url https://access.redhat.com/errata/RHSA-2025:21280
reference_id RHSA-2025:21280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21280
16
reference_url https://access.redhat.com/errata/RHSA-2025:21281
reference_id RHSA-2025:21281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21281
17
reference_url https://access.redhat.com/errata/RHSA-2025:21841
reference_id RHSA-2025:21841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21841
18
reference_url https://access.redhat.com/errata/RHSA-2025:21842
reference_id RHSA-2025:21842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21842
19
reference_url https://access.redhat.com/errata/RHSA-2025:21843
reference_id RHSA-2025:21843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21843
20
reference_url https://access.redhat.com/errata/RHSA-2025:21844
reference_id RHSA-2025:21844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21844
21
reference_url https://access.redhat.com/errata/RHSA-2025:21881
reference_id RHSA-2025:21881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21881
22
reference_url https://access.redhat.com/errata/RHSA-2025:22363
reference_id RHSA-2025:22363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22363
23
reference_url https://access.redhat.com/errata/RHSA-2025:22367
reference_id RHSA-2025:22367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22367
24
reference_url https://access.redhat.com/errata/RHSA-2025:22368
reference_id RHSA-2025:22368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22368
25
reference_url https://access.redhat.com/errata/RHSA-2025:22369
reference_id RHSA-2025:22369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22369
26
reference_url https://access.redhat.com/errata/RHSA-2025:22371
reference_id RHSA-2025:22371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22371
27
reference_url https://access.redhat.com/errata/RHSA-2025:22372
reference_id RHSA-2025:22372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22372
28
reference_url https://access.redhat.com/errata/RHSA-2025:22373
reference_id RHSA-2025:22373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22373
29
reference_url https://access.redhat.com/errata/RHSA-2025:22374
reference_id RHSA-2025:22374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22374
30
reference_url https://access.redhat.com/errata/RHSA-2025:22375
reference_id RHSA-2025:22375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22375
31
reference_url https://access.redhat.com/errata/RHSA-2025:22449
reference_id RHSA-2025:22449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22449
32
reference_url https://access.redhat.com/errata/RHSA-2025:22450
reference_id RHSA-2025:22450
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22450
33
reference_url https://access.redhat.com/errata/RHSA-2025:22451
reference_id RHSA-2025:22451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22451
34
reference_url https://access.redhat.com/errata/RHSA-2025:22791
reference_id RHSA-2025:22791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22791
35
reference_url https://access.redhat.com/errata/RHSA-2025:22792
reference_id RHSA-2025:22792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22792
36
reference_url https://access.redhat.com/errata/RHSA-2025:22882
reference_id RHSA-2025:22882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22882
37
reference_url https://access.redhat.com/errata/RHSA-2025:22883
reference_id RHSA-2025:22883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22883
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1992130
reference_id show_bug.cgi?id=1992130
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-13T15:12:45Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1992130
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-13016
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-962a-dwqf-3ycg
25
url VCID-9zxb-j4ep-n7g9
vulnerability_id VCID-9zxb-j4ep-n7g9
summary Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2791.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2791.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2791
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07538
published_at 2026-04-21T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.0741
published_at 2026-04-18T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07461
published_at 2026-04-04T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07526
published_at 2026-04-11T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07523
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.075
published_at 2026-04-13T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07443
published_at 2026-04-07T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07418
published_at 2026-04-02T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07421
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07512
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2791
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2791
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442342
reference_id 2442342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442342
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:10:15Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:10:15Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:10:15Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:10:15Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2015220
reference_id show_bug.cgi?id=2015220
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:10:15Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2015220
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2791
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9zxb-j4ep-n7g9
26
url VCID-a98z-hwzc-wkcj
vulnerability_id VCID-a98z-hwzc-wkcj
summary Use-after-free in the IPC component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0882.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0882.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0882
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05672
published_at 2026-04-21T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05509
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05533
published_at 2026-04-07T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05555
published_at 2026-04-12T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05568
published_at 2026-04-11T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05595
published_at 2026-04-09T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05571
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05534
published_at 2026-04-04T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.055
published_at 2026-04-02T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05498
published_at 2026-04-16T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05549
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0882
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0882
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2428966
reference_id 2428966
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2428966
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
reference_id mfsa2026-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-01/
reference_id mfsa2026-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:21:25Z/
url https://www.mozilla.org/security/advisories/mfsa2026-01/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-02
reference_id mfsa2026-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-02
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-02/
reference_id mfsa2026-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:21:25Z/
url https://www.mozilla.org/security/advisories/mfsa2026-02/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:21:25Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
reference_id mfsa2026-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-04/
reference_id mfsa2026-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:21:25Z/
url https://www.mozilla.org/security/advisories/mfsa2026-04/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:21:25Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
15
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
16
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
17
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
18
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
19
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
20
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
21
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
22
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
23
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
24
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
25
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
26
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
27
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
28
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
29
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
30
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
31
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
32
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
33
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
34
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
35
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
36
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
37
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1924125
reference_id show_bug.cgi?id=1924125
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:21:25Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1924125
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-0882
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a98z-hwzc-wkcj
27
url VCID-azdd-vdn3-kffy
vulnerability_id VCID-azdd-vdn3-kffy
summary Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2758.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2758.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2758
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20416
published_at 2026-04-21T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20418
published_at 2026-04-18T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.20428
published_at 2026-04-13T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.20483
published_at 2026-04-12T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20528
published_at 2026-04-11T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20579
published_at 2026-04-02T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20504
published_at 2026-04-09T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20447
published_at 2026-04-08T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20366
published_at 2026-04-07T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20638
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2758
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2758
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442337
reference_id 2442337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442337
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:44:21Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:44:21Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:44:21Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:44:21Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:44:21Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2009608
reference_id show_bug.cgi?id=2009608
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:44:21Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2009608
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2758
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azdd-vdn3-kffy
28
url VCID-b5jm-57h2-2qcs
vulnerability_id VCID-b5jm-57h2-2qcs
summary JIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2764.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2764.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2764
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06626
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06477
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06464
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06543
published_at 2026-04-12T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.0655
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06556
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06515
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06476
published_at 2026-04-04T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06441
published_at 2026-04-02T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06469
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06534
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2764
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2764
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442329
reference_id 2442329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442329
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:27:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:27:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:27:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:27:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:27:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2012608
reference_id show_bug.cgi?id=2012608
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:27:58Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2012608
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2764
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b5jm-57h2-2qcs
29
url VCID-b8dx-232z-qbbc
vulnerability_id VCID-b8dx-232z-qbbc
summary Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2779.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2779
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06304
published_at 2026-04-21T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20044
published_at 2026-04-07T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20101
published_at 2026-04-18T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20207
published_at 2026-04-11T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20182
published_at 2026-04-09T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20124
published_at 2026-04-08T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.2032
published_at 2026-04-04T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20261
published_at 2026-04-02T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20097
published_at 2026-04-16T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20104
published_at 2026-04-13T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20162
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2779
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2779
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442327
reference_id 2442327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442327
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:15:18Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:15:18Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:15:18Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:15:18Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1164141
reference_id show_bug.cgi?id=1164141
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:15:18Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1164141
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2779
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b8dx-232z-qbbc
30
url VCID-c6rx-p235-9bdz
vulnerability_id VCID-c6rx-p235-9bdz
summary Memory safety bugs present in Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10537.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10537.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-10537
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18899
published_at 2026-04-04T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18846
published_at 2026-04-02T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18758
published_at 2026-04-11T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18753
published_at 2026-04-09T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18699
published_at 2026-04-08T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18619
published_at 2026-04-07T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.2103
published_at 2026-04-16T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21039
published_at 2026-04-13T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.2104
published_at 2026-04-18T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21018
published_at 2026-04-21T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21091
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-10537
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10537
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395759
reference_id 2395759
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395759
4
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1938220%2C1980730%2C1981280%2C1981283%2C1984505%2C1985067
reference_id buglist.cgi?bug_id=1938220%2C1980730%2C1981280%2C1981283%2C1984505%2C1985067
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-17T03:55:49Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1938220%2C1980730%2C1981280%2C1981283%2C1984505%2C1985067
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
reference_id mfsa2025-73
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-73/
reference_id mfsa2025-73
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-17T03:55:49Z/
url https://www.mozilla.org/security/advisories/mfsa2025-73/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
reference_id mfsa2025-75
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-75/
reference_id mfsa2025-75
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-17T03:55:49Z/
url https://www.mozilla.org/security/advisories/mfsa2025-75/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
reference_id mfsa2025-77
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-77/
reference_id mfsa2025-77
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-17T03:55:49Z/
url https://www.mozilla.org/security/advisories/mfsa2025-77/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
reference_id mfsa2025-78
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-78/
reference_id mfsa2025-78
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-17T03:55:49Z/
url https://www.mozilla.org/security/advisories/mfsa2025-78/
13
reference_url https://access.redhat.com/errata/RHSA-2025:16108
reference_id RHSA-2025:16108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16108
14
reference_url https://access.redhat.com/errata/RHSA-2025:16109
reference_id RHSA-2025:16109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16109
15
reference_url https://access.redhat.com/errata/RHSA-2025:16156
reference_id RHSA-2025:16156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16156
16
reference_url https://access.redhat.com/errata/RHSA-2025:16157
reference_id RHSA-2025:16157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16157
17
reference_url https://access.redhat.com/errata/RHSA-2025:16260
reference_id RHSA-2025:16260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16260
18
reference_url https://access.redhat.com/errata/RHSA-2025:16589
reference_id RHSA-2025:16589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16589
19
reference_url https://access.redhat.com/errata/RHSA-2025:17340
reference_id RHSA-2025:17340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17340
20
reference_url https://access.redhat.com/errata/RHSA-2025:17341
reference_id RHSA-2025:17341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17341
21
reference_url https://access.redhat.com/errata/RHSA-2025:17342
reference_id RHSA-2025:17342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17342
22
reference_url https://access.redhat.com/errata/RHSA-2025:17343
reference_id RHSA-2025:17343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17343
23
reference_url https://access.redhat.com/errata/RHSA-2025:17344
reference_id RHSA-2025:17344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17344
24
reference_url https://access.redhat.com/errata/RHSA-2025:17345
reference_id RHSA-2025:17345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17345
25
reference_url https://access.redhat.com/errata/RHSA-2025:17346
reference_id RHSA-2025:17346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17346
26
reference_url https://access.redhat.com/errata/RHSA-2025:17367
reference_id RHSA-2025:17367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17367
27
reference_url https://access.redhat.com/errata/RHSA-2025:17368
reference_id RHSA-2025:17368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17368
28
reference_url https://access.redhat.com/errata/RHSA-2025:17371
reference_id RHSA-2025:17371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17371
29
reference_url https://access.redhat.com/errata/RHSA-2025:17372
reference_id RHSA-2025:17372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17372
30
reference_url https://access.redhat.com/errata/RHSA-2025:17373
reference_id RHSA-2025:17373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17373
31
reference_url https://access.redhat.com/errata/RHSA-2025:17374
reference_id RHSA-2025:17374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17374
32
reference_url https://access.redhat.com/errata/RHSA-2025:17378
reference_id RHSA-2025:17378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17378
33
reference_url https://access.redhat.com/errata/RHSA-2025:17453
reference_id RHSA-2025:17453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17453
34
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-10537
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c6rx-p235-9bdz
31
url VCID-cpez-x3zd-p7bu
vulnerability_id VCID-cpez-x3zd-p7bu
summary Invalid pointer in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2785.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2785.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2785
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.0438
published_at 2026-04-21T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15044
published_at 2026-04-07T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.14964
published_at 2026-04-18T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15153
published_at 2026-04-11T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15183
published_at 2026-04-09T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15132
published_at 2026-04-08T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15239
published_at 2026-04-04T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15172
published_at 2026-04-02T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14955
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15055
published_at 2026-04-13T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15116
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2785
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2785
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442284
reference_id 2442284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442284
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:06:44Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:06:44Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:06:44Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:06:44Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2013549
reference_id show_bug.cgi?id=2013549
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:06:44Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2013549
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2785
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cpez-x3zd-p7bu
32
url VCID-db28-rbyf-1qf4
vulnerability_id VCID-db28-rbyf-1qf4
summary Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14329.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14329.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14329
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16329
published_at 2026-04-07T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.1647
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16473
published_at 2026-04-09T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16415
published_at 2026-04-08T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16532
published_at 2026-04-04T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22459
published_at 2026-04-16T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22404
published_at 2026-04-21T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22456
published_at 2026-04-18T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22498
published_at 2026-04-12T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22443
published_at 2026-04-13T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22539
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14329
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14329
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420509
reference_id 2420509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420509
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:15Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:15Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:15Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:15Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
13
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
14
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
15
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
16
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
17
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
18
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
19
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
20
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
21
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
22
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
23
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
24
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
25
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
26
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
27
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
28
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
29
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
30
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
31
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
32
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
33
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
34
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
35
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
36
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
37
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1997018
reference_id show_bug.cgi?id=1997018
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:15Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1997018
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-14329
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-db28-rbyf-1qf4
33
url VCID-ddwf-z514-hbbj
vulnerability_id VCID-ddwf-z514-hbbj
summary Information disclosure in the Networking: Cache component. This vulnerability affects Firefox < 143, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10536.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10536.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-10536
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04687
published_at 2026-04-04T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04666
published_at 2026-04-02T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04738
published_at 2026-04-11T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04747
published_at 2026-04-09T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04735
published_at 2026-04-08T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04701
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05586
published_at 2026-04-16T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05632
published_at 2026-04-13T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05598
published_at 2026-04-18T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05755
published_at 2026-04-21T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05639
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-10536
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10536
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395764
reference_id 2395764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395764
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
reference_id mfsa2025-73
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
5
reference_url https://www.mozilla.org/security/advisories/mfsa2025-73/
reference_id mfsa2025-73
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-22T17:33:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-73/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
reference_id mfsa2025-75
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-75/
reference_id mfsa2025-75
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-22T17:33:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-75/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
reference_id mfsa2025-77
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-77/
reference_id mfsa2025-77
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-22T17:33:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-77/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
reference_id mfsa2025-78
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-78/
reference_id mfsa2025-78
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-22T17:33:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-78/
12
reference_url https://access.redhat.com/errata/RHSA-2025:16108
reference_id RHSA-2025:16108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16108
13
reference_url https://access.redhat.com/errata/RHSA-2025:16109
reference_id RHSA-2025:16109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16109
14
reference_url https://access.redhat.com/errata/RHSA-2025:16156
reference_id RHSA-2025:16156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16156
15
reference_url https://access.redhat.com/errata/RHSA-2025:16157
reference_id RHSA-2025:16157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16157
16
reference_url https://access.redhat.com/errata/RHSA-2025:16260
reference_id RHSA-2025:16260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16260
17
reference_url https://access.redhat.com/errata/RHSA-2025:16589
reference_id RHSA-2025:16589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16589
18
reference_url https://access.redhat.com/errata/RHSA-2025:17340
reference_id RHSA-2025:17340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17340
19
reference_url https://access.redhat.com/errata/RHSA-2025:17341
reference_id RHSA-2025:17341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17341
20
reference_url https://access.redhat.com/errata/RHSA-2025:17342
reference_id RHSA-2025:17342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17342
21
reference_url https://access.redhat.com/errata/RHSA-2025:17343
reference_id RHSA-2025:17343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17343
22
reference_url https://access.redhat.com/errata/RHSA-2025:17344
reference_id RHSA-2025:17344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17344
23
reference_url https://access.redhat.com/errata/RHSA-2025:17345
reference_id RHSA-2025:17345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17345
24
reference_url https://access.redhat.com/errata/RHSA-2025:17346
reference_id RHSA-2025:17346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17346
25
reference_url https://access.redhat.com/errata/RHSA-2025:17367
reference_id RHSA-2025:17367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17367
26
reference_url https://access.redhat.com/errata/RHSA-2025:17368
reference_id RHSA-2025:17368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17368
27
reference_url https://access.redhat.com/errata/RHSA-2025:17371
reference_id RHSA-2025:17371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17371
28
reference_url https://access.redhat.com/errata/RHSA-2025:17372
reference_id RHSA-2025:17372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17372
29
reference_url https://access.redhat.com/errata/RHSA-2025:17373
reference_id RHSA-2025:17373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17373
30
reference_url https://access.redhat.com/errata/RHSA-2025:17374
reference_id RHSA-2025:17374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17374
31
reference_url https://access.redhat.com/errata/RHSA-2025:17378
reference_id RHSA-2025:17378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17378
32
reference_url https://access.redhat.com/errata/RHSA-2025:17453
reference_id RHSA-2025:17453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17453
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1981502
reference_id show_bug.cgi?id=1981502
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-22T17:33:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1981502
34
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-10536
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ddwf-z514-hbbj
34
url VCID-deth-9krh-kufj
vulnerability_id VCID-deth-9krh-kufj
summary Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. This vulnerability affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0890.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0890.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0890
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04118
published_at 2026-04-21T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03993
published_at 2026-04-18T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04028
published_at 2026-04-04T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.0404
published_at 2026-04-11T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04067
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04048
published_at 2026-04-08T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04043
published_at 2026-04-07T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04011
published_at 2026-04-02T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.03981
published_at 2026-04-16T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.03998
published_at 2026-04-13T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04026
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0890
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0890
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2428971
reference_id 2428971
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2428971
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
reference_id mfsa2026-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-01/
reference_id mfsa2026-01
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T15:30:33Z/
url https://www.mozilla.org/security/advisories/mfsa2026-01/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T15:30:33Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
reference_id mfsa2026-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-04/
reference_id mfsa2026-04
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T15:30:33Z/
url https://www.mozilla.org/security/advisories/mfsa2026-04/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T15:30:33Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
13
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
14
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
15
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
16
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
17
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
18
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
19
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
20
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
21
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
22
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
23
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
24
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
25
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
26
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
27
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
28
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
29
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
30
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
31
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
32
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
33
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
34
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
35
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
36
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2005081
reference_id show_bug.cgi?id=2005081
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T15:30:33Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2005081
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-0890
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-deth-9krh-kufj
35
url VCID-dgwm-n1zx-qkbq
vulnerability_id VCID-dgwm-n1zx-qkbq
summary Race condition in the Graphics component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13012.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13012
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09794
published_at 2026-04-11T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09762
published_at 2026-04-12T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09746
published_at 2026-04-13T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09604
published_at 2026-04-18T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09632
published_at 2026-04-16T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10314
published_at 2026-04-09T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16207
published_at 2026-04-21T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22362
published_at 2026-04-04T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22319
published_at 2026-04-02T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.2223
published_at 2026-04-08T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22148
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13012
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414086
reference_id 2414086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414086
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
reference_id mfsa2025-87
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-87/
reference_id mfsa2025-87
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-13T15:37:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-87/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
reference_id mfsa2025-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-88/
reference_id mfsa2025-88
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-13T15:37:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-88/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-89
reference_id mfsa2025-89
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-89
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-89/
reference_id mfsa2025-89
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-13T15:37:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-89/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
reference_id mfsa2025-90
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-90/
reference_id mfsa2025-90
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-13T15:37:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-90/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
reference_id mfsa2025-91
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-91/
reference_id mfsa2025-91
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-13T15:37:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-91/
15
reference_url https://access.redhat.com/errata/RHSA-2025:21120
reference_id RHSA-2025:21120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21120
16
reference_url https://access.redhat.com/errata/RHSA-2025:21121
reference_id RHSA-2025:21121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21121
17
reference_url https://access.redhat.com/errata/RHSA-2025:21280
reference_id RHSA-2025:21280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21280
18
reference_url https://access.redhat.com/errata/RHSA-2025:21281
reference_id RHSA-2025:21281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21281
19
reference_url https://access.redhat.com/errata/RHSA-2025:21841
reference_id RHSA-2025:21841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21841
20
reference_url https://access.redhat.com/errata/RHSA-2025:21842
reference_id RHSA-2025:21842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21842
21
reference_url https://access.redhat.com/errata/RHSA-2025:21843
reference_id RHSA-2025:21843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21843
22
reference_url https://access.redhat.com/errata/RHSA-2025:21844
reference_id RHSA-2025:21844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21844
23
reference_url https://access.redhat.com/errata/RHSA-2025:21881
reference_id RHSA-2025:21881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21881
24
reference_url https://access.redhat.com/errata/RHSA-2025:22363
reference_id RHSA-2025:22363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22363
25
reference_url https://access.redhat.com/errata/RHSA-2025:22367
reference_id RHSA-2025:22367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22367
26
reference_url https://access.redhat.com/errata/RHSA-2025:22368
reference_id RHSA-2025:22368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22368
27
reference_url https://access.redhat.com/errata/RHSA-2025:22369
reference_id RHSA-2025:22369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22369
28
reference_url https://access.redhat.com/errata/RHSA-2025:22371
reference_id RHSA-2025:22371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22371
29
reference_url https://access.redhat.com/errata/RHSA-2025:22372
reference_id RHSA-2025:22372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22372
30
reference_url https://access.redhat.com/errata/RHSA-2025:22373
reference_id RHSA-2025:22373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22373
31
reference_url https://access.redhat.com/errata/RHSA-2025:22374
reference_id RHSA-2025:22374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22374
32
reference_url https://access.redhat.com/errata/RHSA-2025:22375
reference_id RHSA-2025:22375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22375
33
reference_url https://access.redhat.com/errata/RHSA-2025:22449
reference_id RHSA-2025:22449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22449
34
reference_url https://access.redhat.com/errata/RHSA-2025:22450
reference_id RHSA-2025:22450
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22450
35
reference_url https://access.redhat.com/errata/RHSA-2025:22451
reference_id RHSA-2025:22451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22451
36
reference_url https://access.redhat.com/errata/RHSA-2025:22791
reference_id RHSA-2025:22791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22791
37
reference_url https://access.redhat.com/errata/RHSA-2025:22792
reference_id RHSA-2025:22792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22792
38
reference_url https://access.redhat.com/errata/RHSA-2025:22882
reference_id RHSA-2025:22882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22882
39
reference_url https://access.redhat.com/errata/RHSA-2025:22883
reference_id RHSA-2025:22883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22883
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1991458
reference_id show_bug.cgi?id=1991458
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-13T15:37:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1991458
41
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-13012
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgwm-n1zx-qkbq
36
url VCID-dxwp-5jfs-nuew
vulnerability_id VCID-dxwp-5jfs-nuew
summary Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2778.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2778.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2778
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07809
published_at 2026-04-21T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.2305
published_at 2026-04-07T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23109
published_at 2026-04-18T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.2316
published_at 2026-04-12T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23197
published_at 2026-04-11T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23176
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23123
published_at 2026-04-08T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23259
published_at 2026-04-04T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23216
published_at 2026-04-02T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23116
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23102
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2778
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2778
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442335
reference_id 2442335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442335
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:17:17Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:17:17Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:17:17Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:17:17Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:17:17Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2016358
reference_id show_bug.cgi?id=2016358
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:17:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2016358
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2778
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dxwp-5jfs-nuew
37
url VCID-e7jk-vs8y-fyhr
vulnerability_id VCID-e7jk-vs8y-fyhr
summary Use-after-free in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13020.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13020.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13020
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10935
published_at 2026-04-11T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10903
published_at 2026-04-12T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10739
published_at 2026-04-16T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.1088
published_at 2026-04-13T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10752
published_at 2026-04-18T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11442
published_at 2026-04-09T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17663
published_at 2026-04-21T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23745
published_at 2026-04-04T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23702
published_at 2026-04-02T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23596
published_at 2026-04-08T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23525
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13020
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13020
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414085
reference_id 2414085
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414085
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
reference_id mfsa2025-87
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-87/
reference_id mfsa2025-87
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T14:56:55Z/
url https://www.mozilla.org/security/advisories/mfsa2025-87/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
reference_id mfsa2025-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-88/
reference_id mfsa2025-88
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T14:56:55Z/
url https://www.mozilla.org/security/advisories/mfsa2025-88/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
reference_id mfsa2025-90
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-90/
reference_id mfsa2025-90
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T14:56:55Z/
url https://www.mozilla.org/security/advisories/mfsa2025-90/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
reference_id mfsa2025-91
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-91/
reference_id mfsa2025-91
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T14:56:55Z/
url https://www.mozilla.org/security/advisories/mfsa2025-91/
13
reference_url https://access.redhat.com/errata/RHSA-2025:21120
reference_id RHSA-2025:21120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21120
14
reference_url https://access.redhat.com/errata/RHSA-2025:21121
reference_id RHSA-2025:21121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21121
15
reference_url https://access.redhat.com/errata/RHSA-2025:21280
reference_id RHSA-2025:21280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21280
16
reference_url https://access.redhat.com/errata/RHSA-2025:21281
reference_id RHSA-2025:21281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21281
17
reference_url https://access.redhat.com/errata/RHSA-2025:21841
reference_id RHSA-2025:21841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21841
18
reference_url https://access.redhat.com/errata/RHSA-2025:21842
reference_id RHSA-2025:21842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21842
19
reference_url https://access.redhat.com/errata/RHSA-2025:21843
reference_id RHSA-2025:21843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21843
20
reference_url https://access.redhat.com/errata/RHSA-2025:21844
reference_id RHSA-2025:21844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21844
21
reference_url https://access.redhat.com/errata/RHSA-2025:21881
reference_id RHSA-2025:21881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21881
22
reference_url https://access.redhat.com/errata/RHSA-2025:22363
reference_id RHSA-2025:22363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22363
23
reference_url https://access.redhat.com/errata/RHSA-2025:22367
reference_id RHSA-2025:22367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22367
24
reference_url https://access.redhat.com/errata/RHSA-2025:22368
reference_id RHSA-2025:22368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22368
25
reference_url https://access.redhat.com/errata/RHSA-2025:22369
reference_id RHSA-2025:22369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22369
26
reference_url https://access.redhat.com/errata/RHSA-2025:22371
reference_id RHSA-2025:22371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22371
27
reference_url https://access.redhat.com/errata/RHSA-2025:22372
reference_id RHSA-2025:22372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22372
28
reference_url https://access.redhat.com/errata/RHSA-2025:22373
reference_id RHSA-2025:22373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22373
29
reference_url https://access.redhat.com/errata/RHSA-2025:22374
reference_id RHSA-2025:22374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22374
30
reference_url https://access.redhat.com/errata/RHSA-2025:22375
reference_id RHSA-2025:22375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22375
31
reference_url https://access.redhat.com/errata/RHSA-2025:22449
reference_id RHSA-2025:22449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22449
32
reference_url https://access.redhat.com/errata/RHSA-2025:22450
reference_id RHSA-2025:22450
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22450
33
reference_url https://access.redhat.com/errata/RHSA-2025:22451
reference_id RHSA-2025:22451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22451
34
reference_url https://access.redhat.com/errata/RHSA-2025:22791
reference_id RHSA-2025:22791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22791
35
reference_url https://access.redhat.com/errata/RHSA-2025:22792
reference_id RHSA-2025:22792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22792
36
reference_url https://access.redhat.com/errata/RHSA-2025:22882
reference_id RHSA-2025:22882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22882
37
reference_url https://access.redhat.com/errata/RHSA-2025:22883
reference_id RHSA-2025:22883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22883
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1995686
reference_id show_bug.cgi?id=1995686
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T14:56:55Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1995686
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-13020
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7jk-vs8y-fyhr
38
url VCID-gcnq-avax-aqcv
vulnerability_id VCID-gcnq-avax-aqcv
summary Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2776.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2776
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07809
published_at 2026-04-21T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23259
published_at 2026-04-04T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23109
published_at 2026-04-18T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.2316
published_at 2026-04-12T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23197
published_at 2026-04-11T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23176
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23123
published_at 2026-04-08T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.2305
published_at 2026-04-07T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23216
published_at 2026-04-02T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23116
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23102
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2776
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2776
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442291
reference_id 2442291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442291
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:19:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:19:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:19:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:19:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:19:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2015266
reference_id show_bug.cgi?id=2015266
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:19:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2015266
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2776
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gcnq-avax-aqcv
39
url VCID-h2gc-zk2a-1fg6
vulnerability_id VCID-h2gc-zk2a-1fg6
summary Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0884.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0884.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0884
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07216
published_at 2026-04-21T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07092
published_at 2026-04-18T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07117
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07198
published_at 2026-04-11T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.072
published_at 2026-04-09T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.0717
published_at 2026-04-08T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.0714
published_at 2026-04-04T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07091
published_at 2026-04-02T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07115
published_at 2026-04-16T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07178
published_at 2026-04-13T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07187
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0884
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0884
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2428967
reference_id 2428967
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2428967
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
reference_id mfsa2026-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-01/
reference_id mfsa2026-01
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-01-13T15:35:44Z/
url https://www.mozilla.org/security/advisories/mfsa2026-01/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-01-13T15:35:44Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
reference_id mfsa2026-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-04/
reference_id mfsa2026-04
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-01-13T15:35:44Z/
url https://www.mozilla.org/security/advisories/mfsa2026-04/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-01-13T15:35:44Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
13
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
14
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
15
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
16
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
17
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
18
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
19
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
20
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
21
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
22
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
23
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
24
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
25
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
26
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
27
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
28
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
29
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
30
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
31
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
32
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
33
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
34
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
35
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
36
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2003588
reference_id show_bug.cgi?id=2003588
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-01-13T15:35:44Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2003588
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-0884
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2gc-zk2a-1fg6
40
url VCID-h9em-p9se-rucn
vulnerability_id VCID-h9em-p9se-rucn
summary Use-after-free in the WebRTC: Signaling component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14321.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14321.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14321
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20569
published_at 2026-04-07T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20797
published_at 2026-04-02T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20707
published_at 2026-04-09T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20646
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20855
published_at 2026-04-04T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24922
published_at 2026-04-11T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.2481
published_at 2026-04-21T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24832
published_at 2026-04-18T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24839
published_at 2026-04-16T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24828
published_at 2026-04-13T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24883
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14321
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14321
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420503
reference_id 2420503
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420503
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T19:36:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T19:36:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T19:36:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T19:36:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
13
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
14
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
15
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
16
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
17
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
18
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
19
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
20
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
21
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
22
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
23
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
24
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
25
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
26
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
27
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
28
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
29
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
30
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
31
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
32
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
33
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
34
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
35
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
36
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
37
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1992760
reference_id show_bug.cgi?id=1992760
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T19:36:51Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1992760
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-14321
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h9em-p9se-rucn
41
url VCID-hccf-ueut-vugw
vulnerability_id VCID-hccf-ueut-vugw
summary Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. This vulnerability affects Firefox < 146, Firefox ESR < 115.31, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14322.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14322.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14322
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.146
published_at 2026-04-04T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.1453
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.1455
published_at 2026-04-09T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14495
published_at 2026-04-08T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.1441
published_at 2026-04-07T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19517
published_at 2026-04-13T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19623
published_at 2026-04-11T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19482
published_at 2026-04-16T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19575
published_at 2026-04-12T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19502
published_at 2026-04-21T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19491
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14322
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14322
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420506
reference_id 2420506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420506
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:18Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
reference_id mfsa2025-93
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-93/
reference_id mfsa2025-93
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:18Z/
url https://www.mozilla.org/security/advisories/mfsa2025-93/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:18Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:18Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:18Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
15
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
16
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
17
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
18
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
19
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
20
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
21
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
22
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
23
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
24
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
25
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
26
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
27
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
28
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
29
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
30
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
31
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
32
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
33
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
34
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
35
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
36
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
37
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
38
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
39
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1996473
reference_id show_bug.cgi?id=1996473
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:18Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1996473
41
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-14322
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hccf-ueut-vugw
42
url VCID-hsc9-up4x-nbgs
vulnerability_id VCID-hsc9-up4x-nbgs
summary Integer overflow in the JavaScript: Standard Library component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2762.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2762.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2762
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06304
published_at 2026-04-21T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20044
published_at 2026-04-07T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20101
published_at 2026-04-18T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20207
published_at 2026-04-11T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20182
published_at 2026-04-09T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20124
published_at 2026-04-08T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.2032
published_at 2026-04-04T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20261
published_at 2026-04-02T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20097
published_at 2026-04-16T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20104
published_at 2026-04-13T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20162
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2762
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2762
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442308
reference_id 2442308
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442308
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:24:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:24:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:24:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:24:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2011649
reference_id show_bug.cgi?id=2011649
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:24:03Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2011649
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2762
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hsc9-up4x-nbgs
43
url VCID-jybh-8px4-pqau
vulnerability_id VCID-jybh-8px4-pqau
summary Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0885.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0885
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05835
published_at 2026-04-21T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05686
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05697
published_at 2026-04-04T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05734
published_at 2026-04-11T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05756
published_at 2026-04-09T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05729
published_at 2026-04-08T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05689
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05657
published_at 2026-04-02T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05676
published_at 2026-04-16T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.0572
published_at 2026-04-13T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05726
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0885
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0885
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2428961
reference_id 2428961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2428961
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
reference_id mfsa2026-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-01/
reference_id mfsa2026-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T20:24:43Z/
url https://www.mozilla.org/security/advisories/mfsa2026-01/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T20:24:43Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
reference_id mfsa2026-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-04/
reference_id mfsa2026-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T20:24:43Z/
url https://www.mozilla.org/security/advisories/mfsa2026-04/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T20:24:43Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
13
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
14
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
15
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
16
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
17
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
18
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
19
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
20
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
21
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
22
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
23
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
24
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
25
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
26
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
27
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
28
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
29
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
30
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
31
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
32
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
33
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
34
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
35
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
36
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2003607
reference_id show_bug.cgi?id=2003607
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T20:24:43Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2003607
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-0885
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jybh-8px4-pqau
44
url VCID-kdwy-7p45-hbcs
vulnerability_id VCID-kdwy-7p45-hbcs
summary Spoofing issue in Firefox. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13015.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13015.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13015
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08138
published_at 2026-04-16T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08124
published_at 2026-04-18T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11327
published_at 2026-04-21T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13252
published_at 2026-04-13T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.1334
published_at 2026-04-11T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13302
published_at 2026-04-12T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13908
published_at 2026-04-09T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.27955
published_at 2026-04-07T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.28116
published_at 2026-04-02T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.28023
published_at 2026-04-08T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.28159
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13015
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13015
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414090
reference_id 2414090
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414090
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
reference_id mfsa2025-87
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-87/
reference_id mfsa2025-87
reference_type
scores
0
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T15:30:38Z/
url https://www.mozilla.org/security/advisories/mfsa2025-87/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
reference_id mfsa2025-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-88/
reference_id mfsa2025-88
reference_type
scores
0
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T15:30:38Z/
url https://www.mozilla.org/security/advisories/mfsa2025-88/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-89
reference_id mfsa2025-89
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-89
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-89/
reference_id mfsa2025-89
reference_type
scores
0
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T15:30:38Z/
url https://www.mozilla.org/security/advisories/mfsa2025-89/
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-90/
reference_id mfsa2025-90
reference_type
scores
0
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T15:30:38Z/
url https://www.mozilla.org/security/advisories/mfsa2025-90/
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-91/
reference_id mfsa2025-91
reference_type
scores
0
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T15:30:38Z/
url https://www.mozilla.org/security/advisories/mfsa2025-91/
13
reference_url https://access.redhat.com/errata/RHSA-2025:21120
reference_id RHSA-2025:21120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21120
14
reference_url https://access.redhat.com/errata/RHSA-2025:21121
reference_id RHSA-2025:21121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21121
15
reference_url https://access.redhat.com/errata/RHSA-2025:21280
reference_id RHSA-2025:21280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21280
16
reference_url https://access.redhat.com/errata/RHSA-2025:21281
reference_id RHSA-2025:21281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21281
17
reference_url https://access.redhat.com/errata/RHSA-2025:21841
reference_id RHSA-2025:21841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21841
18
reference_url https://access.redhat.com/errata/RHSA-2025:21842
reference_id RHSA-2025:21842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21842
19
reference_url https://access.redhat.com/errata/RHSA-2025:21843
reference_id RHSA-2025:21843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21843
20
reference_url https://access.redhat.com/errata/RHSA-2025:21844
reference_id RHSA-2025:21844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21844
21
reference_url https://access.redhat.com/errata/RHSA-2025:21881
reference_id RHSA-2025:21881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21881
22
reference_url https://access.redhat.com/errata/RHSA-2025:22363
reference_id RHSA-2025:22363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22363
23
reference_url https://access.redhat.com/errata/RHSA-2025:22367
reference_id RHSA-2025:22367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22367
24
reference_url https://access.redhat.com/errata/RHSA-2025:22368
reference_id RHSA-2025:22368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22368
25
reference_url https://access.redhat.com/errata/RHSA-2025:22369
reference_id RHSA-2025:22369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22369
26
reference_url https://access.redhat.com/errata/RHSA-2025:22371
reference_id RHSA-2025:22371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22371
27
reference_url https://access.redhat.com/errata/RHSA-2025:22372
reference_id RHSA-2025:22372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22372
28
reference_url https://access.redhat.com/errata/RHSA-2025:22373
reference_id RHSA-2025:22373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22373
29
reference_url https://access.redhat.com/errata/RHSA-2025:22374
reference_id RHSA-2025:22374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22374
30
reference_url https://access.redhat.com/errata/RHSA-2025:22375
reference_id RHSA-2025:22375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22375
31
reference_url https://access.redhat.com/errata/RHSA-2025:22449
reference_id RHSA-2025:22449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22449
32
reference_url https://access.redhat.com/errata/RHSA-2025:22450
reference_id RHSA-2025:22450
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22450
33
reference_url https://access.redhat.com/errata/RHSA-2025:22451
reference_id RHSA-2025:22451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22451
34
reference_url https://access.redhat.com/errata/RHSA-2025:22791
reference_id RHSA-2025:22791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22791
35
reference_url https://access.redhat.com/errata/RHSA-2025:22792
reference_id RHSA-2025:22792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22792
36
reference_url https://access.redhat.com/errata/RHSA-2025:22882
reference_id RHSA-2025:22882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22882
37
reference_url https://access.redhat.com/errata/RHSA-2025:22883
reference_id RHSA-2025:22883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22883
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1994164
reference_id show_bug.cgi?id=1994164
reference_type
scores
0
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T15:30:38Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1994164
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-13015
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kdwy-7p45-hbcs
45
url VCID-kk2m-2mxz-sbex
vulnerability_id VCID-kk2m-2mxz-sbex
summary Spoofing issue in the Downloads Panel component. This vulnerability affects Firefox < 146, Thunderbird < 146, Firefox ESR < 140.7, and Thunderbird < 140.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14327.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14327.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14327
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02672
published_at 2026-04-04T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02659
published_at 2026-04-02T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02702
published_at 2026-04-09T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02682
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.0268
published_at 2026-04-07T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03467
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03403
published_at 2026-04-18T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03391
published_at 2026-04-16T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03415
published_at 2026-04-13T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03439
published_at 2026-04-12T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03521
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14327
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14327
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420507
reference_id 2420507
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420507
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T20:42:08Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T20:42:08Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T20:42:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T20:42:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
13
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
14
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
15
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
16
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
17
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
18
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
19
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
20
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
21
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
22
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
23
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
24
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
25
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
26
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
27
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
28
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
29
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
30
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
31
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
32
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
33
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
34
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
35
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
36
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1970743
reference_id show_bug.cgi?id=1970743
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T20:42:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1970743
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-14327
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kk2m-2mxz-sbex
46
url VCID-kkgh-a9hg-fud8
vulnerability_id VCID-kkgh-a9hg-fud8
summary A compromised web process using malicious IPC messages could have caused the privileged browser process to reveal blocks of its memory to the compromised process.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11710.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11710
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26641
published_at 2026-04-21T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26681
published_at 2026-04-18T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.2671
published_at 2026-04-16T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26702
published_at 2026-04-13T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26856
published_at 2026-04-02T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26896
published_at 2026-04-04T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.2675
published_at 2026-04-08T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26682
published_at 2026-04-07T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26759
published_at 2026-04-12T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26803
published_at 2026-04-11T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.268
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11710
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403768
reference_id 2403768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403768
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
reference_id mfsa2025-81
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
5
reference_url https://www.mozilla.org/security/advisories/mfsa2025-81/
reference_id mfsa2025-81
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:34Z/
url https://www.mozilla.org/security/advisories/mfsa2025-81/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-82
reference_id mfsa2025-82
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-82
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-82/
reference_id mfsa2025-82
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:34Z/
url https://www.mozilla.org/security/advisories/mfsa2025-82/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
reference_id mfsa2025-83
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-83/
reference_id mfsa2025-83
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:34Z/
url https://www.mozilla.org/security/advisories/mfsa2025-83/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
reference_id mfsa2025-84
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-84/
reference_id mfsa2025-84
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:34Z/
url https://www.mozilla.org/security/advisories/mfsa2025-84/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
reference_id mfsa2025-85
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
13
reference_url https://www.mozilla.org/security/advisories/mfsa2025-85/
reference_id mfsa2025-85
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:34Z/
url https://www.mozilla.org/security/advisories/mfsa2025-85/
14
reference_url https://access.redhat.com/errata/RHSA-2025:18154
reference_id RHSA-2025:18154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18154
15
reference_url https://access.redhat.com/errata/RHSA-2025:18155
reference_id RHSA-2025:18155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18155
16
reference_url https://access.redhat.com/errata/RHSA-2025:18285
reference_id RHSA-2025:18285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18285
17
reference_url https://access.redhat.com/errata/RHSA-2025:18320
reference_id RHSA-2025:18320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18320
18
reference_url https://access.redhat.com/errata/RHSA-2025:18321
reference_id RHSA-2025:18321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18321
19
reference_url https://access.redhat.com/errata/RHSA-2025:18983
reference_id RHSA-2025:18983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18983
20
reference_url https://access.redhat.com/errata/RHSA-2025:19278
reference_id RHSA-2025:19278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19278
21
reference_url https://access.redhat.com/errata/RHSA-2025:19938
reference_id RHSA-2025:19938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19938
22
reference_url https://access.redhat.com/errata/RHSA-2025:19939
reference_id RHSA-2025:19939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19939
23
reference_url https://access.redhat.com/errata/RHSA-2025:19941
reference_id RHSA-2025:19941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19941
24
reference_url https://access.redhat.com/errata/RHSA-2025:19942
reference_id RHSA-2025:19942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19942
25
reference_url https://access.redhat.com/errata/RHSA-2025:19943
reference_id RHSA-2025:19943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19943
26
reference_url https://access.redhat.com/errata/RHSA-2025:19944
reference_id RHSA-2025:19944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19944
27
reference_url https://access.redhat.com/errata/RHSA-2025:19945
reference_id RHSA-2025:19945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19945
28
reference_url https://access.redhat.com/errata/RHSA-2025:21054
reference_id RHSA-2025:21054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21054
29
reference_url https://access.redhat.com/errata/RHSA-2025:21055
reference_id RHSA-2025:21055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21055
30
reference_url https://access.redhat.com/errata/RHSA-2025:21056
reference_id RHSA-2025:21056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21056
31
reference_url https://access.redhat.com/errata/RHSA-2025:21057
reference_id RHSA-2025:21057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21057
32
reference_url https://access.redhat.com/errata/RHSA-2025:21058
reference_id RHSA-2025:21058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21058
33
reference_url https://access.redhat.com/errata/RHSA-2025:21059
reference_id RHSA-2025:21059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21059
34
reference_url https://access.redhat.com/errata/RHSA-2025:21064
reference_id RHSA-2025:21064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21064
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1989899
reference_id show_bug.cgi?id=1989899
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:34Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1989899
36
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-11710
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kkgh-a9hg-fud8
47
url VCID-m3mp-su9k-sfhs
vulnerability_id VCID-m3mp-su9k-sfhs
summary Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2763.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2763.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2763
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.0641
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06265
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06295
published_at 2026-04-13T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06306
published_at 2026-04-12T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.0631
published_at 2026-04-11T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06226
published_at 2026-04-02T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06318
published_at 2026-04-09T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06276
published_at 2026-04-08T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06232
published_at 2026-04-07T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06252
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2763
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2763
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442316
reference_id 2442316
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442316
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:25:44Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:25:44Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:25:44Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:25:44Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:25:44Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2012018
reference_id show_bug.cgi?id=2012018
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:25:44Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2012018
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2763
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m3mp-su9k-sfhs
48
url VCID-menq-g5ce-1yd8
vulnerability_id VCID-menq-g5ce-1yd8
summary Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2793.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2793.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2793
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21656
published_at 2026-04-21T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21686
published_at 2026-04-18T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.2163
published_at 2026-04-07T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21735
published_at 2026-04-12T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21775
published_at 2026-04-11T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21763
published_at 2026-04-09T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21706
published_at 2026-04-08T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21878
published_at 2026-04-04T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21825
published_at 2026-04-02T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21679
published_at 2026-04-16T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21678
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2793
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2793
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442287
reference_id 2442287
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442287
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=2015196%2C2016423%2C2016498
reference_id buglist.cgi?bug_id=2015196%2C2016423%2C2016498
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:55Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=2015196%2C2016423%2C2016498
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
7
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:55Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
9
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:55Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
11
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:55Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
13
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:55Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
15
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:55Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
16
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
17
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
18
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
19
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
20
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
21
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
22
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
23
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
24
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
25
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
26
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
27
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
28
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
29
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
30
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
31
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
32
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
33
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
34
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
35
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
36
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
37
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
38
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
39
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
40
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2793
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-menq-g5ce-1yd8
49
url VCID-mn6j-2wd1-ukfb
vulnerability_id VCID-mn6j-2wd1-ukfb
summary Integer overflow in the Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2774.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2774.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2774
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05833
published_at 2026-04-21T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.1536
published_at 2026-04-07T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15283
published_at 2026-04-18T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15422
published_at 2026-04-12T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15461
published_at 2026-04-11T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15497
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15447
published_at 2026-04-08T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.1556
published_at 2026-04-04T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15489
published_at 2026-04-02T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15276
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15358
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2774
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2774
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442290
reference_id 2442290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442290
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:21:15Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:21:15Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:21:15Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:21:15Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:21:15Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2014883
reference_id show_bug.cgi?id=2014883
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:21:15Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2014883
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2774
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mn6j-2wd1-ukfb
50
url VCID-ndd4-kd1y-z7ep
vulnerability_id VCID-ndd4-kd1y-z7ep
summary Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. This vulnerability affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0878.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0878.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0878
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07865
published_at 2026-04-21T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07712
published_at 2026-04-18T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07827
published_at 2026-04-04T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07851
published_at 2026-04-11T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.07861
published_at 2026-04-09T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.0784
published_at 2026-04-08T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.07783
published_at 2026-04-07T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.0778
published_at 2026-04-02T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07739
published_at 2026-04-16T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07825
published_at 2026-04-13T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.07838
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0878
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0878
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2428965
reference_id 2428965
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2428965
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
reference_id mfsa2026-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-01/
reference_id mfsa2026-01
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:40:42Z/
url https://www.mozilla.org/security/advisories/mfsa2026-01/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:40:42Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
reference_id mfsa2026-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-04/
reference_id mfsa2026-04
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:40:42Z/
url https://www.mozilla.org/security/advisories/mfsa2026-04/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:40:42Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
13
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
14
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
15
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
16
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
17
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
18
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
19
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
20
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
21
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
22
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
23
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
24
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
25
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
26
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
27
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
28
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
29
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
30
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
31
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
32
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
33
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
34
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
35
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
36
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2003989
reference_id show_bug.cgi?id=2003989
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:40:42Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2003989
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-0878
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ndd4-kd1y-z7ep
51
url VCID-nhsr-4zux-2bck
vulnerability_id VCID-nhsr-4zux-2bck
summary Use-after-free in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2769.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2769.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2769
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04987
published_at 2026-04-21T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15526
published_at 2026-04-07T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15468
published_at 2026-04-18T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15599
published_at 2026-04-12T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15634
published_at 2026-04-11T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15667
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15612
published_at 2026-04-08T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15724
published_at 2026-04-04T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.1566
published_at 2026-04-02T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15462
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15536
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2769
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2769
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442295
reference_id 2442295
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442295
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T14:20:50Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T14:20:50Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T14:20:50Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T14:20:50Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T14:20:50Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2014550
reference_id show_bug.cgi?id=2014550
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T14:20:50Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2014550
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2769
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nhsr-4zux-2bck
52
url VCID-nkpq-9gd6-nuc4
vulnerability_id VCID-nkpq-9gd6-nuc4
summary Memory safety bugs present in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0891.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0891.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0891
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.0682
published_at 2026-04-21T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06662
published_at 2026-04-18T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06688
published_at 2026-04-04T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06742
published_at 2026-04-13T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06749
published_at 2026-04-12T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06757
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06724
published_at 2026-04-08T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06674
published_at 2026-04-07T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06643
published_at 2026-04-02T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06673
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0891
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0891
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2428963
reference_id 2428963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2428963
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1964722%2C2000981%2C2003100%2C2003278
reference_id buglist.cgi?bug_id=1964722%2C2000981%2C2003100%2C2003278
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-15T04:56:05Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T14:32:50Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1964722%2C2000981%2C2003100%2C2003278
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
reference_id mfsa2026-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
7
reference_url https://www.mozilla.org/security/advisories/mfsa2026-01/
reference_id mfsa2026-01
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-15T04:56:05Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T14:32:50Z/
url https://www.mozilla.org/security/advisories/mfsa2026-01/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
9
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T14:32:50Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-15T04:56:05Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
reference_id mfsa2026-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
11
reference_url https://www.mozilla.org/security/advisories/mfsa2026-04/
reference_id mfsa2026-04
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-15T04:56:05Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T14:32:50Z/
url https://www.mozilla.org/security/advisories/mfsa2026-04/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
13
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-15T04:56:05Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T14:32:50Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
14
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
15
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
16
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
17
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
18
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
19
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
20
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
21
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
22
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
23
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
24
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
25
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
26
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
27
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
28
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
29
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
30
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
31
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
32
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
33
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
34
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
35
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
36
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-0891
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nkpq-9gd6-nuc4
53
url VCID-ntqr-ptmu-yuen
vulnerability_id VCID-ntqr-ptmu-yuen
summary Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2767.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2767.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2767
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15016
published_at 2026-04-21T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.14964
published_at 2026-04-18T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15044
published_at 2026-04-07T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15153
published_at 2026-04-11T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15183
published_at 2026-04-09T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15132
published_at 2026-04-08T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15239
published_at 2026-04-04T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15172
published_at 2026-04-02T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14955
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15055
published_at 2026-04-13T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15116
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2767
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2767
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442328
reference_id 2442328
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442328
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:10:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:10:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:10:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:10:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2013741
reference_id show_bug.cgi?id=2013741
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:10:23Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2013741
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2767
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ntqr-ptmu-yuen
54
url VCID-p9zh-7wyj-hffm
vulnerability_id VCID-p9zh-7wyj-hffm
summary Undefined behavior in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2771.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2771.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2771
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07988
published_at 2026-04-21T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20366
published_at 2026-04-07T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.20428
published_at 2026-04-13T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.20483
published_at 2026-04-12T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20528
published_at 2026-04-11T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20504
published_at 2026-04-09T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20447
published_at 2026-04-08T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20638
published_at 2026-04-04T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20579
published_at 2026-04-02T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20418
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2771
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2771
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442288
reference_id 2442288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442288
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-03T01:45:06Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-16T14:30:32Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-03T01:45:06Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-16T14:30:32Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-03T01:45:06Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-16T14:30:32Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-03T01:45:06Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-16T14:30:32Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-03T01:45:06Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-16T14:30:32Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2014593
reference_id show_bug.cgi?id=2014593
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-16T14:30:32Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-03T01:45:06Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2014593
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2771
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9zh-7wyj-hffm
55
url VCID-pcgf-xtfq-6ugb
vulnerability_id VCID-pcgf-xtfq-6ugb
summary JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14330.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14330.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14330
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21238
published_at 2026-04-07T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21432
published_at 2026-04-02T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.2138
published_at 2026-04-09T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21318
published_at 2026-04-08T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21486
published_at 2026-04-04T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.2542
published_at 2026-04-16T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25377
published_at 2026-04-21T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25409
published_at 2026-04-18T12:55:00Z
8
value 0.0009
scoring_system epss
scoring_elements 0.25471
published_at 2026-04-12T12:55:00Z
9
value 0.0009
scoring_system epss
scoring_elements 0.25414
published_at 2026-04-13T12:55:00Z
10
value 0.0009
scoring_system epss
scoring_elements 0.25514
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14330
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14330
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420516
reference_id 2420516
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420516
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:35:46Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:35:46Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:35:46Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:35:46Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
13
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
14
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
15
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
16
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
17
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
18
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
19
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
20
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
21
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
22
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
23
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
24
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
25
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
26
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
27
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
28
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
29
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
30
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
31
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
32
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
33
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
34
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
35
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
36
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
37
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1997503
reference_id show_bug.cgi?id=1997503
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:35:46Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1997503
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-14330
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pcgf-xtfq-6ugb
56
url VCID-pemg-ndu8-wbbc
vulnerability_id VCID-pemg-ndu8-wbbc
summary Sandbox escape due to incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0879.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0879
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07362
published_at 2026-04-21T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07235
published_at 2026-04-18T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07273
published_at 2026-04-04T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07319
published_at 2026-04-12T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07331
published_at 2026-04-11T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07333
published_at 2026-04-09T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07307
published_at 2026-04-08T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07252
published_at 2026-04-07T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07229
published_at 2026-04-02T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07239
published_at 2026-04-16T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07309
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0879
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2428973
reference_id 2428973
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2428973
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
reference_id mfsa2026-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-01/
reference_id mfsa2026-01
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:37:22Z/
url https://www.mozilla.org/security/advisories/mfsa2026-01/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-02
reference_id mfsa2026-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-02
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-02/
reference_id mfsa2026-02
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:37:22Z/
url https://www.mozilla.org/security/advisories/mfsa2026-02/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:37:22Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
reference_id mfsa2026-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-04/
reference_id mfsa2026-04
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:37:22Z/
url https://www.mozilla.org/security/advisories/mfsa2026-04/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:37:22Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
15
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
16
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
17
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
18
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
19
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
20
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
21
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
22
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
23
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
24
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
25
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
26
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
27
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
28
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
29
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
30
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
31
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
32
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
33
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
34
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
35
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
36
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
37
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2004602
reference_id show_bug.cgi?id=2004602
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:37:22Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2004602
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-0879
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pemg-ndu8-wbbc
57
url VCID-q1pv-avug-juef
vulnerability_id VCID-q1pv-avug-juef
summary Privilege escalation in the Messaging System component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2777.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2777
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19874
published_at 2026-04-21T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19876
published_at 2026-04-18T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19843
published_at 2026-04-07T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19952
published_at 2026-04-12T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19997
published_at 2026-04-11T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19977
published_at 2026-04-09T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19923
published_at 2026-04-08T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20117
published_at 2026-04-04T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.20059
published_at 2026-04-02T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19871
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19894
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2777
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442312
reference_id 2442312
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442312
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:56:06Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:56:06Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:56:06Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:56:06Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:56:06Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2015305
reference_id show_bug.cgi?id=2015305
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:56:06Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2015305
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2777
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q1pv-avug-juef
58
url VCID-qeh2-jn2v-9ug7
vulnerability_id VCID-qeh2-jn2v-9ug7
summary A compromised web process was able to trigger out of bounds reads and writes in a more privileged process using manipulated WebGL textures.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11709.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11709.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11709
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26641
published_at 2026-04-21T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26681
published_at 2026-04-18T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.2671
published_at 2026-04-16T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26702
published_at 2026-04-13T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26856
published_at 2026-04-02T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26759
published_at 2026-04-12T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26803
published_at 2026-04-11T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.268
published_at 2026-04-09T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.2675
published_at 2026-04-08T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26682
published_at 2026-04-07T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26896
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11709
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11709
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403765
reference_id 2403765
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403765
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
reference_id mfsa2025-81
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
5
reference_url https://www.mozilla.org/security/advisories/mfsa2025-81/
reference_id mfsa2025-81
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:47Z/
url https://www.mozilla.org/security/advisories/mfsa2025-81/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-82
reference_id mfsa2025-82
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-82
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-82/
reference_id mfsa2025-82
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:47Z/
url https://www.mozilla.org/security/advisories/mfsa2025-82/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
reference_id mfsa2025-83
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-83/
reference_id mfsa2025-83
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:47Z/
url https://www.mozilla.org/security/advisories/mfsa2025-83/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
reference_id mfsa2025-84
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-84/
reference_id mfsa2025-84
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:47Z/
url https://www.mozilla.org/security/advisories/mfsa2025-84/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
reference_id mfsa2025-85
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
13
reference_url https://www.mozilla.org/security/advisories/mfsa2025-85/
reference_id mfsa2025-85
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:47Z/
url https://www.mozilla.org/security/advisories/mfsa2025-85/
14
reference_url https://access.redhat.com/errata/RHSA-2025:18154
reference_id RHSA-2025:18154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18154
15
reference_url https://access.redhat.com/errata/RHSA-2025:18155
reference_id RHSA-2025:18155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18155
16
reference_url https://access.redhat.com/errata/RHSA-2025:18285
reference_id RHSA-2025:18285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18285
17
reference_url https://access.redhat.com/errata/RHSA-2025:18320
reference_id RHSA-2025:18320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18320
18
reference_url https://access.redhat.com/errata/RHSA-2025:18321
reference_id RHSA-2025:18321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18321
19
reference_url https://access.redhat.com/errata/RHSA-2025:18983
reference_id RHSA-2025:18983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18983
20
reference_url https://access.redhat.com/errata/RHSA-2025:19278
reference_id RHSA-2025:19278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19278
21
reference_url https://access.redhat.com/errata/RHSA-2025:19938
reference_id RHSA-2025:19938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19938
22
reference_url https://access.redhat.com/errata/RHSA-2025:19939
reference_id RHSA-2025:19939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19939
23
reference_url https://access.redhat.com/errata/RHSA-2025:19941
reference_id RHSA-2025:19941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19941
24
reference_url https://access.redhat.com/errata/RHSA-2025:19942
reference_id RHSA-2025:19942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19942
25
reference_url https://access.redhat.com/errata/RHSA-2025:19943
reference_id RHSA-2025:19943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19943
26
reference_url https://access.redhat.com/errata/RHSA-2025:19944
reference_id RHSA-2025:19944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19944
27
reference_url https://access.redhat.com/errata/RHSA-2025:19945
reference_id RHSA-2025:19945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19945
28
reference_url https://access.redhat.com/errata/RHSA-2025:21054
reference_id RHSA-2025:21054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21054
29
reference_url https://access.redhat.com/errata/RHSA-2025:21055
reference_id RHSA-2025:21055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21055
30
reference_url https://access.redhat.com/errata/RHSA-2025:21056
reference_id RHSA-2025:21056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21056
31
reference_url https://access.redhat.com/errata/RHSA-2025:21057
reference_id RHSA-2025:21057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21057
32
reference_url https://access.redhat.com/errata/RHSA-2025:21058
reference_id RHSA-2025:21058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21058
33
reference_url https://access.redhat.com/errata/RHSA-2025:21059
reference_id RHSA-2025:21059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21059
34
reference_url https://access.redhat.com/errata/RHSA-2025:21064
reference_id RHSA-2025:21064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21064
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1989127
reference_id show_bug.cgi?id=1989127
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:22:47Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1989127
36
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-11709
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qeh2-jn2v-9ug7
59
url VCID-qgvy-hzsx-hkge
vulnerability_id VCID-qgvy-hzsx-hkge
summary Use-after-free in the Audio/Video component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13014.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13014.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13014
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13292
published_at 2026-04-11T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13254
published_at 2026-04-12T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13205
published_at 2026-04-13T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13112
published_at 2026-04-18T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13848
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.2064
published_at 2026-04-21T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26276
published_at 2026-04-07T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26456
published_at 2026-04-02T12:55:00Z
8
value 0.00095
scoring_system epss
scoring_elements 0.26344
published_at 2026-04-08T12:55:00Z
9
value 0.00095
scoring_system epss
scoring_elements 0.265
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13014
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13014
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414080
reference_id 2414080
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414080
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
reference_id mfsa2025-87
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-87/
reference_id mfsa2025-87
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:33:45Z/
url https://www.mozilla.org/security/advisories/mfsa2025-87/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
reference_id mfsa2025-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-88/
reference_id mfsa2025-88
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:33:45Z/
url https://www.mozilla.org/security/advisories/mfsa2025-88/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-89
reference_id mfsa2025-89
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-89
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-89/
reference_id mfsa2025-89
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:33:45Z/
url https://www.mozilla.org/security/advisories/mfsa2025-89/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
reference_id mfsa2025-90
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-90/
reference_id mfsa2025-90
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:33:45Z/
url https://www.mozilla.org/security/advisories/mfsa2025-90/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
reference_id mfsa2025-91
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-91/
reference_id mfsa2025-91
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:33:45Z/
url https://www.mozilla.org/security/advisories/mfsa2025-91/
15
reference_url https://access.redhat.com/errata/RHSA-2025:21120
reference_id RHSA-2025:21120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21120
16
reference_url https://access.redhat.com/errata/RHSA-2025:21121
reference_id RHSA-2025:21121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21121
17
reference_url https://access.redhat.com/errata/RHSA-2025:21280
reference_id RHSA-2025:21280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21280
18
reference_url https://access.redhat.com/errata/RHSA-2025:21281
reference_id RHSA-2025:21281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21281
19
reference_url https://access.redhat.com/errata/RHSA-2025:21841
reference_id RHSA-2025:21841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21841
20
reference_url https://access.redhat.com/errata/RHSA-2025:21842
reference_id RHSA-2025:21842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21842
21
reference_url https://access.redhat.com/errata/RHSA-2025:21843
reference_id RHSA-2025:21843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21843
22
reference_url https://access.redhat.com/errata/RHSA-2025:21844
reference_id RHSA-2025:21844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21844
23
reference_url https://access.redhat.com/errata/RHSA-2025:21881
reference_id RHSA-2025:21881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21881
24
reference_url https://access.redhat.com/errata/RHSA-2025:22363
reference_id RHSA-2025:22363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22363
25
reference_url https://access.redhat.com/errata/RHSA-2025:22367
reference_id RHSA-2025:22367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22367
26
reference_url https://access.redhat.com/errata/RHSA-2025:22368
reference_id RHSA-2025:22368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22368
27
reference_url https://access.redhat.com/errata/RHSA-2025:22369
reference_id RHSA-2025:22369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22369
28
reference_url https://access.redhat.com/errata/RHSA-2025:22371
reference_id RHSA-2025:22371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22371
29
reference_url https://access.redhat.com/errata/RHSA-2025:22372
reference_id RHSA-2025:22372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22372
30
reference_url https://access.redhat.com/errata/RHSA-2025:22373
reference_id RHSA-2025:22373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22373
31
reference_url https://access.redhat.com/errata/RHSA-2025:22374
reference_id RHSA-2025:22374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22374
32
reference_url https://access.redhat.com/errata/RHSA-2025:22375
reference_id RHSA-2025:22375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22375
33
reference_url https://access.redhat.com/errata/RHSA-2025:22449
reference_id RHSA-2025:22449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22449
34
reference_url https://access.redhat.com/errata/RHSA-2025:22450
reference_id RHSA-2025:22450
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22450
35
reference_url https://access.redhat.com/errata/RHSA-2025:22451
reference_id RHSA-2025:22451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22451
36
reference_url https://access.redhat.com/errata/RHSA-2025:22791
reference_id RHSA-2025:22791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22791
37
reference_url https://access.redhat.com/errata/RHSA-2025:22792
reference_id RHSA-2025:22792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22792
38
reference_url https://access.redhat.com/errata/RHSA-2025:22882
reference_id RHSA-2025:22882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22882
39
reference_url https://access.redhat.com/errata/RHSA-2025:22883
reference_id RHSA-2025:22883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22883
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1994241
reference_id show_bug.cgi?id=1994241
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:33:45Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1994241
41
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-13014
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qgvy-hzsx-hkge
60
url VCID-qm8f-f8nr-qba9
vulnerability_id VCID-qm8f-f8nr-qba9
summary Sandbox escape due to integer overflow in the Graphics component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0880.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0880.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0880
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05672
published_at 2026-04-21T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05509
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05534
published_at 2026-04-04T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05555
published_at 2026-04-12T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05568
published_at 2026-04-11T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05595
published_at 2026-04-09T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05571
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05533
published_at 2026-04-07T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.055
published_at 2026-04-02T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05498
published_at 2026-04-16T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05549
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0880
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0880
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2428975
reference_id 2428975
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2428975
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
reference_id mfsa2026-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-01/
reference_id mfsa2026-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:40:37Z/
url https://www.mozilla.org/security/advisories/mfsa2026-01/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-02
reference_id mfsa2026-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-02
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-02/
reference_id mfsa2026-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:40:37Z/
url https://www.mozilla.org/security/advisories/mfsa2026-02/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:40:37Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
reference_id mfsa2026-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-04/
reference_id mfsa2026-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:40:37Z/
url https://www.mozilla.org/security/advisories/mfsa2026-04/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:40:37Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
15
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
16
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
17
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
18
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
19
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
20
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
21
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
22
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
23
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
24
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
25
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
26
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
27
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
28
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
29
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
30
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
31
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
32
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
33
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
34
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
35
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
36
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
37
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2005014
reference_id show_bug.cgi?id=2005014
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-13T18:40:37Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2005014
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-0880
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qm8f-f8nr-qba9
61
url VCID-qta2-8rnt-k7d1
vulnerability_id VCID-qta2-8rnt-k7d1
summary Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2788.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2788.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2788
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.0641
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06265
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06295
published_at 2026-04-13T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06306
published_at 2026-04-12T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.0631
published_at 2026-04-11T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06226
published_at 2026-04-02T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06318
published_at 2026-04-09T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06276
published_at 2026-04-08T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06232
published_at 2026-04-07T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06252
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2788
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2788
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442302
reference_id 2442302
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442302
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:11:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:11:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:11:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:11:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:11:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2014824
reference_id show_bug.cgi?id=2014824
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:11:58Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2014824
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2788
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qta2-8rnt-k7d1
62
url VCID-r7vt-w149-9bfn
vulnerability_id VCID-r7vt-w149-9bfn
summary Incorrect boundary conditions in the Web Audio component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2773.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2773.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2773
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07988
published_at 2026-04-21T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.0783
published_at 2026-04-18T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07891
published_at 2026-04-07T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07941
published_at 2026-04-12T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.07958
published_at 2026-04-11T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.0797
published_at 2026-04-09T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.07949
published_at 2026-04-08T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07934
published_at 2026-04-04T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07886
published_at 2026-04-02T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07845
published_at 2026-04-16T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.07927
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2773
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2773
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442319
reference_id 2442319
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442319
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:37:52Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:37:52Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:37:52Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:37:52Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:37:52Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2014832
reference_id show_bug.cgi?id=2014832
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:37:52Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2014832
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2773
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r7vt-w149-9bfn
63
url VCID-rg63-avu7-2bdc
vulnerability_id VCID-rg63-avu7-2bdc
summary Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability affects Firefox < 143, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10527.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-10527
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.16282
published_at 2026-04-04T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.16221
published_at 2026-04-02T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.16209
published_at 2026-04-11T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.16227
published_at 2026-04-09T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.16162
published_at 2026-04-08T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.16078
published_at 2026-04-07T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18416
published_at 2026-04-16T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18472
published_at 2026-04-13T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18429
published_at 2026-04-18T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.1845
published_at 2026-04-21T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18523
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-10527
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10527
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395745
reference_id 2395745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395745
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
reference_id mfsa2025-73
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
5
reference_url https://www.mozilla.org/security/advisories/mfsa2025-73/
reference_id mfsa2025-73
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:30:33Z/
url https://www.mozilla.org/security/advisories/mfsa2025-73/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
reference_id mfsa2025-75
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-75/
reference_id mfsa2025-75
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:30:33Z/
url https://www.mozilla.org/security/advisories/mfsa2025-75/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
reference_id mfsa2025-77
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-77/
reference_id mfsa2025-77
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:30:33Z/
url https://www.mozilla.org/security/advisories/mfsa2025-77/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
reference_id mfsa2025-78
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-78/
reference_id mfsa2025-78
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:30:33Z/
url https://www.mozilla.org/security/advisories/mfsa2025-78/
12
reference_url https://access.redhat.com/errata/RHSA-2025:16108
reference_id RHSA-2025:16108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16108
13
reference_url https://access.redhat.com/errata/RHSA-2025:16109
reference_id RHSA-2025:16109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16109
14
reference_url https://access.redhat.com/errata/RHSA-2025:16156
reference_id RHSA-2025:16156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16156
15
reference_url https://access.redhat.com/errata/RHSA-2025:16157
reference_id RHSA-2025:16157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16157
16
reference_url https://access.redhat.com/errata/RHSA-2025:16260
reference_id RHSA-2025:16260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16260
17
reference_url https://access.redhat.com/errata/RHSA-2025:16589
reference_id RHSA-2025:16589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16589
18
reference_url https://access.redhat.com/errata/RHSA-2025:17340
reference_id RHSA-2025:17340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17340
19
reference_url https://access.redhat.com/errata/RHSA-2025:17341
reference_id RHSA-2025:17341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17341
20
reference_url https://access.redhat.com/errata/RHSA-2025:17342
reference_id RHSA-2025:17342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17342
21
reference_url https://access.redhat.com/errata/RHSA-2025:17343
reference_id RHSA-2025:17343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17343
22
reference_url https://access.redhat.com/errata/RHSA-2025:17344
reference_id RHSA-2025:17344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17344
23
reference_url https://access.redhat.com/errata/RHSA-2025:17345
reference_id RHSA-2025:17345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17345
24
reference_url https://access.redhat.com/errata/RHSA-2025:17346
reference_id RHSA-2025:17346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17346
25
reference_url https://access.redhat.com/errata/RHSA-2025:17367
reference_id RHSA-2025:17367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17367
26
reference_url https://access.redhat.com/errata/RHSA-2025:17368
reference_id RHSA-2025:17368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17368
27
reference_url https://access.redhat.com/errata/RHSA-2025:17371
reference_id RHSA-2025:17371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17371
28
reference_url https://access.redhat.com/errata/RHSA-2025:17372
reference_id RHSA-2025:17372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17372
29
reference_url https://access.redhat.com/errata/RHSA-2025:17373
reference_id RHSA-2025:17373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17373
30
reference_url https://access.redhat.com/errata/RHSA-2025:17374
reference_id RHSA-2025:17374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17374
31
reference_url https://access.redhat.com/errata/RHSA-2025:17378
reference_id RHSA-2025:17378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17378
32
reference_url https://access.redhat.com/errata/RHSA-2025:17453
reference_id RHSA-2025:17453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17453
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1984825
reference_id show_bug.cgi?id=1984825
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:30:33Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1984825
34
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-10527
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rg63-avu7-2bdc
64
url VCID-ruc1-kmaz-fkbb
vulnerability_id VCID-ruc1-kmaz-fkbb
summary Incorrect boundary conditions in the JavaScript: GC component. This vulnerability affects Firefox < 143, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10532.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10532.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-10532
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17898
published_at 2026-04-04T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17844
published_at 2026-04-02T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17768
published_at 2026-04-11T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.1775
published_at 2026-04-09T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17688
published_at 2026-04-08T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17599
published_at 2026-04-07T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.2005
published_at 2026-04-16T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20052
published_at 2026-04-21T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20067
published_at 2026-04-13T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20054
published_at 2026-04-18T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20125
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-10532
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10532
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395754
reference_id 2395754
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395754
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
reference_id mfsa2025-73
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-73
5
reference_url https://www.mozilla.org/security/advisories/mfsa2025-73/
reference_id mfsa2025-73
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T17:10:59Z/
url https://www.mozilla.org/security/advisories/mfsa2025-73/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
reference_id mfsa2025-75
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-75
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-75/
reference_id mfsa2025-75
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T17:10:59Z/
url https://www.mozilla.org/security/advisories/mfsa2025-75/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
reference_id mfsa2025-77
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-77
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-77/
reference_id mfsa2025-77
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T17:10:59Z/
url https://www.mozilla.org/security/advisories/mfsa2025-77/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
reference_id mfsa2025-78
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-78
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-78/
reference_id mfsa2025-78
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T17:10:59Z/
url https://www.mozilla.org/security/advisories/mfsa2025-78/
12
reference_url https://access.redhat.com/errata/RHSA-2025:16108
reference_id RHSA-2025:16108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16108
13
reference_url https://access.redhat.com/errata/RHSA-2025:16109
reference_id RHSA-2025:16109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16109
14
reference_url https://access.redhat.com/errata/RHSA-2025:16156
reference_id RHSA-2025:16156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16156
15
reference_url https://access.redhat.com/errata/RHSA-2025:16157
reference_id RHSA-2025:16157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16157
16
reference_url https://access.redhat.com/errata/RHSA-2025:16260
reference_id RHSA-2025:16260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16260
17
reference_url https://access.redhat.com/errata/RHSA-2025:16589
reference_id RHSA-2025:16589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16589
18
reference_url https://access.redhat.com/errata/RHSA-2025:17340
reference_id RHSA-2025:17340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17340
19
reference_url https://access.redhat.com/errata/RHSA-2025:17341
reference_id RHSA-2025:17341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17341
20
reference_url https://access.redhat.com/errata/RHSA-2025:17342
reference_id RHSA-2025:17342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17342
21
reference_url https://access.redhat.com/errata/RHSA-2025:17343
reference_id RHSA-2025:17343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17343
22
reference_url https://access.redhat.com/errata/RHSA-2025:17344
reference_id RHSA-2025:17344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17344
23
reference_url https://access.redhat.com/errata/RHSA-2025:17345
reference_id RHSA-2025:17345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17345
24
reference_url https://access.redhat.com/errata/RHSA-2025:17346
reference_id RHSA-2025:17346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17346
25
reference_url https://access.redhat.com/errata/RHSA-2025:17367
reference_id RHSA-2025:17367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17367
26
reference_url https://access.redhat.com/errata/RHSA-2025:17368
reference_id RHSA-2025:17368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17368
27
reference_url https://access.redhat.com/errata/RHSA-2025:17371
reference_id RHSA-2025:17371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17371
28
reference_url https://access.redhat.com/errata/RHSA-2025:17372
reference_id RHSA-2025:17372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17372
29
reference_url https://access.redhat.com/errata/RHSA-2025:17373
reference_id RHSA-2025:17373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17373
30
reference_url https://access.redhat.com/errata/RHSA-2025:17374
reference_id RHSA-2025:17374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17374
31
reference_url https://access.redhat.com/errata/RHSA-2025:17378
reference_id RHSA-2025:17378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17378
32
reference_url https://access.redhat.com/errata/RHSA-2025:17453
reference_id RHSA-2025:17453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17453
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1979502
reference_id show_bug.cgi?id=1979502
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-17T17:10:59Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1979502
34
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-10532
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ruc1-kmaz-fkbb
65
url VCID-sgwe-9xfj-6kav
vulnerability_id VCID-sgwe-9xfj-6kav
summary Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2783.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2783.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2783
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12121
published_at 2026-04-21T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12003
published_at 2026-04-18T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12269
published_at 2026-04-04T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12208
published_at 2026-04-11T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.122
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12149
published_at 2026-04-08T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12068
published_at 2026-04-07T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12224
published_at 2026-04-02T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12007
published_at 2026-04-16T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12136
published_at 2026-04-13T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12171
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2783
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2783
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442300
reference_id 2442300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442300
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-26T20:09:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-26T20:09:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-26T20:09:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-26T20:09:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2010943
reference_id show_bug.cgi?id=2010943
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-26T20:09:59Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2010943
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2783
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sgwe-9xfj-6kav
66
url VCID-ss9j-7jd7-nbf1
vulnerability_id VCID-ss9j-7jd7-nbf1
summary Use-after-free in the DOM: Bindings (WebIDL) component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2770.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2770.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2770
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03498
published_at 2026-04-21T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.1536
published_at 2026-04-07T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15283
published_at 2026-04-18T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15422
published_at 2026-04-12T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15461
published_at 2026-04-11T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15497
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15447
published_at 2026-04-08T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.1556
published_at 2026-04-04T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15489
published_at 2026-04-02T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15276
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15358
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2770
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2770
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442343
reference_id 2442343
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442343
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:16:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:16:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:16:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:16:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:16:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2014585
reference_id show_bug.cgi?id=2014585
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:16:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2014585
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2770
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ss9j-7jd7-nbf1
67
url VCID-t2c3-smqc-zkba
vulnerability_id VCID-t2c3-smqc-zkba
summary Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0877.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0877.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0877
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06429
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06283
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06278
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.0633
published_at 2026-04-12T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06335
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06343
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06302
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06257
published_at 2026-04-07T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06261
published_at 2026-04-02T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.0627
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06318
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0877
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0877
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2428969
reference_id 2428969
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2428969
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
reference_id mfsa2026-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-01/
reference_id mfsa2026-01
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:24:18Z/
url https://www.mozilla.org/security/advisories/mfsa2026-01/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-02
reference_id mfsa2026-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-02
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-02/
reference_id mfsa2026-02
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:24:18Z/
url https://www.mozilla.org/security/advisories/mfsa2026-02/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:24:18Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
reference_id mfsa2026-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-04/
reference_id mfsa2026-04
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:24:18Z/
url https://www.mozilla.org/security/advisories/mfsa2026-04/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:24:18Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
15
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
16
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
17
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
18
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
19
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
20
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
21
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
22
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
23
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
24
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
25
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
26
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
27
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
28
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
29
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
30
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
31
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
32
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
33
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
34
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
35
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
36
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
37
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1999257
reference_id show_bug.cgi?id=1999257
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:24:18Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1999257
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-0877
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t2c3-smqc-zkba
68
url VCID-t9cw-yjar-ckfd
vulnerability_id VCID-t9cw-yjar-ckfd
summary A malicious page could have used the type attribute of an OBJECT tag to override the default browser behavior when encountering a web resource served without a content-type. This could have contributed to an XSS on a site that unsafely serves files without a content-type header.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11712.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11712.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11712
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.1205
published_at 2026-04-21T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.11931
published_at 2026-04-18T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.11934
published_at 2026-04-16T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12141
published_at 2026-04-02T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12186
published_at 2026-04-04T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.1207
published_at 2026-04-08T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.11988
published_at 2026-04-07T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12062
published_at 2026-04-13T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12093
published_at 2026-04-12T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12129
published_at 2026-04-11T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12122
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11712
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11712
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403770
reference_id 2403770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403770
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
reference_id mfsa2025-81
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
5
reference_url https://www.mozilla.org/security/advisories/mfsa2025-81/
reference_id mfsa2025-81
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:21:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-81/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
reference_id mfsa2025-83
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-83/
reference_id mfsa2025-83
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:21:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-83/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
reference_id mfsa2025-84
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-84/
reference_id mfsa2025-84
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:21:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-84/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
reference_id mfsa2025-85
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-85/
reference_id mfsa2025-85
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:21:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-85/
12
reference_url https://access.redhat.com/errata/RHSA-2025:18154
reference_id RHSA-2025:18154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18154
13
reference_url https://access.redhat.com/errata/RHSA-2025:18155
reference_id RHSA-2025:18155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18155
14
reference_url https://access.redhat.com/errata/RHSA-2025:18285
reference_id RHSA-2025:18285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18285
15
reference_url https://access.redhat.com/errata/RHSA-2025:18320
reference_id RHSA-2025:18320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18320
16
reference_url https://access.redhat.com/errata/RHSA-2025:18321
reference_id RHSA-2025:18321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18321
17
reference_url https://access.redhat.com/errata/RHSA-2025:18983
reference_id RHSA-2025:18983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18983
18
reference_url https://access.redhat.com/errata/RHSA-2025:19278
reference_id RHSA-2025:19278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19278
19
reference_url https://access.redhat.com/errata/RHSA-2025:19938
reference_id RHSA-2025:19938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19938
20
reference_url https://access.redhat.com/errata/RHSA-2025:19939
reference_id RHSA-2025:19939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19939
21
reference_url https://access.redhat.com/errata/RHSA-2025:19941
reference_id RHSA-2025:19941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19941
22
reference_url https://access.redhat.com/errata/RHSA-2025:19942
reference_id RHSA-2025:19942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19942
23
reference_url https://access.redhat.com/errata/RHSA-2025:19943
reference_id RHSA-2025:19943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19943
24
reference_url https://access.redhat.com/errata/RHSA-2025:19944
reference_id RHSA-2025:19944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19944
25
reference_url https://access.redhat.com/errata/RHSA-2025:19945
reference_id RHSA-2025:19945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19945
26
reference_url https://access.redhat.com/errata/RHSA-2025:21054
reference_id RHSA-2025:21054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21054
27
reference_url https://access.redhat.com/errata/RHSA-2025:21055
reference_id RHSA-2025:21055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21055
28
reference_url https://access.redhat.com/errata/RHSA-2025:21056
reference_id RHSA-2025:21056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21056
29
reference_url https://access.redhat.com/errata/RHSA-2025:21057
reference_id RHSA-2025:21057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21057
30
reference_url https://access.redhat.com/errata/RHSA-2025:21058
reference_id RHSA-2025:21058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21058
31
reference_url https://access.redhat.com/errata/RHSA-2025:21059
reference_id RHSA-2025:21059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21059
32
reference_url https://access.redhat.com/errata/RHSA-2025:21064
reference_id RHSA-2025:21064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21064
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1979536
reference_id show_bug.cgi?id=1979536
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:21:51Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1979536
34
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-11712
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t9cw-yjar-ckfd
69
url VCID-te1e-sjsk-bfd8
vulnerability_id VCID-te1e-sjsk-bfd8
summary Sandbox escape in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2768.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2768.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2768
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26708
published_at 2026-04-21T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26746
published_at 2026-04-18T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.2675
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26869
published_at 2026-04-11T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26866
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26818
published_at 2026-04-08T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.2696
published_at 2026-04-04T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26923
published_at 2026-04-02T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26774
published_at 2026-04-16T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26767
published_at 2026-04-13T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26824
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2768
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2768
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442298
reference_id 2442298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442298
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T21:02:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T21:02:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T21:02:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T21:02:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2014101
reference_id show_bug.cgi?id=2014101
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T21:02:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2014101
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2768
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-te1e-sjsk-bfd8
70
url VCID-tgsj-hp8b-27f9
vulnerability_id VCID-tgsj-hp8b-27f9
summary There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11711.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11711.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11711
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08172
published_at 2026-04-21T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08015
published_at 2026-04-18T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.0803
published_at 2026-04-16T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08124
published_at 2026-04-13T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08091
published_at 2026-04-02T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.0814
published_at 2026-04-12T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.0816
published_at 2026-04-11T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08085
published_at 2026-04-07T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08146
published_at 2026-04-08T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08134
published_at 2026-04-04T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08169
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11711
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11711
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403776
reference_id 2403776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403776
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
reference_id mfsa2025-81
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-81
5
reference_url https://www.mozilla.org/security/advisories/mfsa2025-81/
reference_id mfsa2025-81
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:22:20Z/
url https://www.mozilla.org/security/advisories/mfsa2025-81/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-82
reference_id mfsa2025-82
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-82
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-82/
reference_id mfsa2025-82
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:22:20Z/
url https://www.mozilla.org/security/advisories/mfsa2025-82/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
reference_id mfsa2025-83
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-83
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-83/
reference_id mfsa2025-83
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:22:20Z/
url https://www.mozilla.org/security/advisories/mfsa2025-83/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
reference_id mfsa2025-84
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-84
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-84/
reference_id mfsa2025-84
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:22:20Z/
url https://www.mozilla.org/security/advisories/mfsa2025-84/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
reference_id mfsa2025-85
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-85
13
reference_url https://www.mozilla.org/security/advisories/mfsa2025-85/
reference_id mfsa2025-85
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:22:20Z/
url https://www.mozilla.org/security/advisories/mfsa2025-85/
14
reference_url https://access.redhat.com/errata/RHSA-2025:18154
reference_id RHSA-2025:18154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18154
15
reference_url https://access.redhat.com/errata/RHSA-2025:18155
reference_id RHSA-2025:18155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18155
16
reference_url https://access.redhat.com/errata/RHSA-2025:18285
reference_id RHSA-2025:18285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18285
17
reference_url https://access.redhat.com/errata/RHSA-2025:18320
reference_id RHSA-2025:18320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18320
18
reference_url https://access.redhat.com/errata/RHSA-2025:18321
reference_id RHSA-2025:18321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18321
19
reference_url https://access.redhat.com/errata/RHSA-2025:18983
reference_id RHSA-2025:18983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18983
20
reference_url https://access.redhat.com/errata/RHSA-2025:19278
reference_id RHSA-2025:19278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19278
21
reference_url https://access.redhat.com/errata/RHSA-2025:19938
reference_id RHSA-2025:19938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19938
22
reference_url https://access.redhat.com/errata/RHSA-2025:19939
reference_id RHSA-2025:19939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19939
23
reference_url https://access.redhat.com/errata/RHSA-2025:19941
reference_id RHSA-2025:19941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19941
24
reference_url https://access.redhat.com/errata/RHSA-2025:19942
reference_id RHSA-2025:19942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19942
25
reference_url https://access.redhat.com/errata/RHSA-2025:19943
reference_id RHSA-2025:19943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19943
26
reference_url https://access.redhat.com/errata/RHSA-2025:19944
reference_id RHSA-2025:19944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19944
27
reference_url https://access.redhat.com/errata/RHSA-2025:19945
reference_id RHSA-2025:19945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19945
28
reference_url https://access.redhat.com/errata/RHSA-2025:21054
reference_id RHSA-2025:21054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21054
29
reference_url https://access.redhat.com/errata/RHSA-2025:21055
reference_id RHSA-2025:21055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21055
30
reference_url https://access.redhat.com/errata/RHSA-2025:21056
reference_id RHSA-2025:21056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21056
31
reference_url https://access.redhat.com/errata/RHSA-2025:21057
reference_id RHSA-2025:21057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21057
32
reference_url https://access.redhat.com/errata/RHSA-2025:21058
reference_id RHSA-2025:21058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21058
33
reference_url https://access.redhat.com/errata/RHSA-2025:21059
reference_id RHSA-2025:21059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21059
34
reference_url https://access.redhat.com/errata/RHSA-2025:21064
reference_id RHSA-2025:21064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21064
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1989978
reference_id show_bug.cgi?id=1989978
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:22:20Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1989978
36
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-11711
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tgsj-hp8b-27f9
71
url VCID-tkzd-c11q-3qaf
vulnerability_id VCID-tkzd-c11q-3qaf
summary Same-origin policy bypass in the Request Handling component. This vulnerability affects Firefox < 146, Firefox ESR < 115.31, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14331.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14331.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14331
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.10997
published_at 2026-04-04T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.10932
published_at 2026-04-02T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.1095
published_at 2026-04-09T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-08T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.10822
published_at 2026-04-07T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13633
published_at 2026-04-13T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13718
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13545
published_at 2026-04-16T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13682
published_at 2026-04-12T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13616
published_at 2026-04-21T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13543
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14331
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14331
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420512
reference_id 2420512
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420512
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:59:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
reference_id mfsa2025-93
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-93/
reference_id mfsa2025-93
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:59:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-93/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:59:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:59:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:59:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
15
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
16
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
17
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
18
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
19
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
20
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
21
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
22
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
23
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
24
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
25
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
26
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
27
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
28
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
29
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
30
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
31
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
32
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
33
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
34
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
35
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
36
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
37
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
38
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
39
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2000218
reference_id show_bug.cgi?id=2000218
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:59:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2000218
41
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-14331
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tkzd-c11q-3qaf
72
url VCID-ud33-vgxh-8khj
vulnerability_id VCID-ud33-vgxh-8khj
summary Use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2766.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2766.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2766
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06304
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.0615
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06121
published_at 2026-04-07T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06192
published_at 2026-04-11T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06201
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06164
published_at 2026-04-08T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06137
published_at 2026-04-04T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06107
published_at 2026-04-02T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06138
published_at 2026-04-16T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06179
published_at 2026-04-13T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06187
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2766
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2766
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442294
reference_id 2442294
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442294
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:31:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:31:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:31:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:31:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2013583
reference_id show_bug.cgi?id=2013583
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T02:31:58Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2013583
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2766
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ud33-vgxh-8khj
73
url VCID-ukut-zyjx-93gq
vulnerability_id VCID-ukut-zyjx-93gq
summary Mitigation bypass in the DOM: Core & HTML component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13013.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13013.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13013
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12178
published_at 2026-04-11T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12141
published_at 2026-04-12T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12109
published_at 2026-04-13T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.11977
published_at 2026-04-18T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.1198
published_at 2026-04-16T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12681
published_at 2026-04-09T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17003
published_at 2026-04-21T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26314
published_at 2026-04-04T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26272
published_at 2026-04-02T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26153
published_at 2026-04-08T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26086
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13013
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13013
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414091
reference_id 2414091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414091
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
reference_id mfsa2025-87
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-87/
reference_id mfsa2025-87
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T15:35:19Z/
url https://www.mozilla.org/security/advisories/mfsa2025-87/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
reference_id mfsa2025-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-88/
reference_id mfsa2025-88
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T15:35:19Z/
url https://www.mozilla.org/security/advisories/mfsa2025-88/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-89
reference_id mfsa2025-89
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-89
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-89/
reference_id mfsa2025-89
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T15:35:19Z/
url https://www.mozilla.org/security/advisories/mfsa2025-89/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
reference_id mfsa2025-90
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-90/
reference_id mfsa2025-90
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T15:35:19Z/
url https://www.mozilla.org/security/advisories/mfsa2025-90/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
reference_id mfsa2025-91
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-91/
reference_id mfsa2025-91
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T15:35:19Z/
url https://www.mozilla.org/security/advisories/mfsa2025-91/
15
reference_url https://access.redhat.com/errata/RHSA-2025:21120
reference_id RHSA-2025:21120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21120
16
reference_url https://access.redhat.com/errata/RHSA-2025:21121
reference_id RHSA-2025:21121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21121
17
reference_url https://access.redhat.com/errata/RHSA-2025:21280
reference_id RHSA-2025:21280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21280
18
reference_url https://access.redhat.com/errata/RHSA-2025:21281
reference_id RHSA-2025:21281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21281
19
reference_url https://access.redhat.com/errata/RHSA-2025:21841
reference_id RHSA-2025:21841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21841
20
reference_url https://access.redhat.com/errata/RHSA-2025:21842
reference_id RHSA-2025:21842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21842
21
reference_url https://access.redhat.com/errata/RHSA-2025:21843
reference_id RHSA-2025:21843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21843
22
reference_url https://access.redhat.com/errata/RHSA-2025:21844
reference_id RHSA-2025:21844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21844
23
reference_url https://access.redhat.com/errata/RHSA-2025:21881
reference_id RHSA-2025:21881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21881
24
reference_url https://access.redhat.com/errata/RHSA-2025:22363
reference_id RHSA-2025:22363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22363
25
reference_url https://access.redhat.com/errata/RHSA-2025:22367
reference_id RHSA-2025:22367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22367
26
reference_url https://access.redhat.com/errata/RHSA-2025:22368
reference_id RHSA-2025:22368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22368
27
reference_url https://access.redhat.com/errata/RHSA-2025:22369
reference_id RHSA-2025:22369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22369
28
reference_url https://access.redhat.com/errata/RHSA-2025:22371
reference_id RHSA-2025:22371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22371
29
reference_url https://access.redhat.com/errata/RHSA-2025:22372
reference_id RHSA-2025:22372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22372
30
reference_url https://access.redhat.com/errata/RHSA-2025:22373
reference_id RHSA-2025:22373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22373
31
reference_url https://access.redhat.com/errata/RHSA-2025:22374
reference_id RHSA-2025:22374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22374
32
reference_url https://access.redhat.com/errata/RHSA-2025:22375
reference_id RHSA-2025:22375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22375
33
reference_url https://access.redhat.com/errata/RHSA-2025:22449
reference_id RHSA-2025:22449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22449
34
reference_url https://access.redhat.com/errata/RHSA-2025:22450
reference_id RHSA-2025:22450
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22450
35
reference_url https://access.redhat.com/errata/RHSA-2025:22451
reference_id RHSA-2025:22451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22451
36
reference_url https://access.redhat.com/errata/RHSA-2025:22791
reference_id RHSA-2025:22791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22791
37
reference_url https://access.redhat.com/errata/RHSA-2025:22792
reference_id RHSA-2025:22792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22792
38
reference_url https://access.redhat.com/errata/RHSA-2025:22882
reference_id RHSA-2025:22882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22882
39
reference_url https://access.redhat.com/errata/RHSA-2025:22883
reference_id RHSA-2025:22883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22883
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1991945
reference_id show_bug.cgi?id=1991945
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T15:35:19Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1991945
41
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-13013
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ukut-zyjx-93gq
74
url VCID-vszp-vyxy-f7g7
vulnerability_id VCID-vszp-vyxy-f7g7
summary Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2781.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2781
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15283
published_at 2026-04-18T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15489
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15332
published_at 2026-04-21T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.1556
published_at 2026-04-04T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.1536
published_at 2026-04-07T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15447
published_at 2026-04-08T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15497
published_at 2026-04-09T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15461
published_at 2026-04-11T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15422
published_at 2026-04-12T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15358
published_at 2026-04-13T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15276
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2781
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442292
reference_id 2442292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442292
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-31
reference_id mfsa2026-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-31
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-31/
reference_id mfsa2026-31
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-31/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2009552
reference_id show_bug.cgi?id=2009552
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2009552
41
reference_url https://usn.ubuntu.com/8071-1/
reference_id USN-8071-1
reference_type
scores
url https://usn.ubuntu.com/8071-1/
42
reference_url https://usn.ubuntu.com/8071-2/
reference_id USN-8071-2
reference_type
scores
url https://usn.ubuntu.com/8071-2/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2781
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vszp-vyxy-f7g7
75
url VCID-w4u8-25rz-gqeq
vulnerability_id VCID-w4u8-25rz-gqeq
summary Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2782.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2782
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15771
published_at 2026-04-21T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15727
published_at 2026-04-18T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15778
published_at 2026-04-07T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15901
published_at 2026-04-11T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15926
published_at 2026-04-09T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15864
published_at 2026-04-08T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15979
published_at 2026-04-04T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15917
published_at 2026-04-02T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15717
published_at 2026-04-16T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15795
published_at 2026-04-13T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15863
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2782
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2782
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442331
reference_id 2442331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442331
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:58Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2010743
reference_id show_bug.cgi?id=2010743
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-25T04:55:58Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2010743
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2782
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w4u8-25rz-gqeq
76
url VCID-wagm-cq36-k7g3
vulnerability_id VCID-wagm-cq36-k7g3
summary Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2760.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2760
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23071
published_at 2026-04-21T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23109
published_at 2026-04-18T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.2305
published_at 2026-04-07T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.2316
published_at 2026-04-12T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23197
published_at 2026-04-11T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23176
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23123
published_at 2026-04-08T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23259
published_at 2026-04-04T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23216
published_at 2026-04-02T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23116
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23102
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2760
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2760
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442325
reference_id 2442325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442325
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:49:35Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:49:35Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:49:35Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:49:35Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:49:35Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2011062
reference_id show_bug.cgi?id=2011062
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:49:35Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2011062
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2760
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wagm-cq36-k7g3
77
url VCID-wwdh-xmux-3qdq
vulnerability_id VCID-wwdh-xmux-3qdq
summary Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2759.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2759.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2759
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20416
published_at 2026-04-21T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20418
published_at 2026-04-18T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.20428
published_at 2026-04-13T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.20483
published_at 2026-04-12T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20528
published_at 2026-04-11T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20579
published_at 2026-04-02T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20504
published_at 2026-04-09T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20447
published_at 2026-04-08T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20366
published_at 2026-04-07T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20638
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2759
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2759
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442307
reference_id 2442307
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442307
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:46:43Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:46:43Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:46:43Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:46:43Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:46:43Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2010933
reference_id show_bug.cgi?id=2010933
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-26T15:46:43Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2010933
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2759
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wwdh-xmux-3qdq
78
url VCID-wwkc-4c69-cbea
vulnerability_id VCID-wwkc-4c69-cbea
summary Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2784.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2784.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2784
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.06141
published_at 2026-04-21T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19488
published_at 2026-04-07T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19491
published_at 2026-04-18T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19624
published_at 2026-04-11T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.1962
published_at 2026-04-09T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19567
published_at 2026-04-08T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19764
published_at 2026-04-04T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19714
published_at 2026-04-02T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19483
published_at 2026-04-16T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19517
published_at 2026-04-13T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19575
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2784
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2784
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442304
reference_id 2442304
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442304
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:13:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:13:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:13:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:13:23Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2012984
reference_id show_bug.cgi?id=2012984
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-02-28T03:13:23Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2012984
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2784
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wwkc-4c69-cbea
79
url VCID-wz6r-xzm9-m7hp
vulnerability_id VCID-wz6r-xzm9-m7hp
summary Same-origin policy bypass in the DOM: Notifications component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13017.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13017.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13017
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06945
published_at 2026-04-16T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.07023
published_at 2026-04-11T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.07013
published_at 2026-04-12T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.07006
published_at 2026-04-13T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06929
published_at 2026-04-18T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.0734
published_at 2026-04-09T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10136
published_at 2026-04-21T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18762
published_at 2026-04-04T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18708
published_at 2026-04-02T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18559
published_at 2026-04-08T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18478
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13017
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13017
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414092
reference_id 2414092
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414092
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
reference_id mfsa2025-87
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-87
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-87/
reference_id mfsa2025-87
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:14:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-87/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
reference_id mfsa2025-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-88
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-88/
reference_id mfsa2025-88
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:14:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-88/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
reference_id mfsa2025-90
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-90
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-90/
reference_id mfsa2025-90
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:14:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-90/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
reference_id mfsa2025-91
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-91
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-91/
reference_id mfsa2025-91
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:14:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-91/
13
reference_url https://access.redhat.com/errata/RHSA-2025:21120
reference_id RHSA-2025:21120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21120
14
reference_url https://access.redhat.com/errata/RHSA-2025:21121
reference_id RHSA-2025:21121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21121
15
reference_url https://access.redhat.com/errata/RHSA-2025:21280
reference_id RHSA-2025:21280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21280
16
reference_url https://access.redhat.com/errata/RHSA-2025:21281
reference_id RHSA-2025:21281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21281
17
reference_url https://access.redhat.com/errata/RHSA-2025:21841
reference_id RHSA-2025:21841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21841
18
reference_url https://access.redhat.com/errata/RHSA-2025:21842
reference_id RHSA-2025:21842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21842
19
reference_url https://access.redhat.com/errata/RHSA-2025:21843
reference_id RHSA-2025:21843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21843
20
reference_url https://access.redhat.com/errata/RHSA-2025:21844
reference_id RHSA-2025:21844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21844
21
reference_url https://access.redhat.com/errata/RHSA-2025:21881
reference_id RHSA-2025:21881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21881
22
reference_url https://access.redhat.com/errata/RHSA-2025:22363
reference_id RHSA-2025:22363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22363
23
reference_url https://access.redhat.com/errata/RHSA-2025:22367
reference_id RHSA-2025:22367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22367
24
reference_url https://access.redhat.com/errata/RHSA-2025:22368
reference_id RHSA-2025:22368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22368
25
reference_url https://access.redhat.com/errata/RHSA-2025:22369
reference_id RHSA-2025:22369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22369
26
reference_url https://access.redhat.com/errata/RHSA-2025:22371
reference_id RHSA-2025:22371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22371
27
reference_url https://access.redhat.com/errata/RHSA-2025:22372
reference_id RHSA-2025:22372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22372
28
reference_url https://access.redhat.com/errata/RHSA-2025:22373
reference_id RHSA-2025:22373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22373
29
reference_url https://access.redhat.com/errata/RHSA-2025:22374
reference_id RHSA-2025:22374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22374
30
reference_url https://access.redhat.com/errata/RHSA-2025:22375
reference_id RHSA-2025:22375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22375
31
reference_url https://access.redhat.com/errata/RHSA-2025:22449
reference_id RHSA-2025:22449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22449
32
reference_url https://access.redhat.com/errata/RHSA-2025:22450
reference_id RHSA-2025:22450
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22450
33
reference_url https://access.redhat.com/errata/RHSA-2025:22451
reference_id RHSA-2025:22451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22451
34
reference_url https://access.redhat.com/errata/RHSA-2025:22791
reference_id RHSA-2025:22791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22791
35
reference_url https://access.redhat.com/errata/RHSA-2025:22792
reference_id RHSA-2025:22792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22792
36
reference_url https://access.redhat.com/errata/RHSA-2025:22882
reference_id RHSA-2025:22882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22882
37
reference_url https://access.redhat.com/errata/RHSA-2025:22883
reference_id RHSA-2025:22883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22883
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1980904
reference_id show_bug.cgi?id=1980904
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-12T15:14:51Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1980904
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-13017
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wz6r-xzm9-m7hp
80
url VCID-xcbn-tkgg-4ben
vulnerability_id VCID-xcbn-tkgg-4ben
summary Use-after-free in the Audio/Video: Playback component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2772.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2772.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2772
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04801
published_at 2026-04-21T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.1536
published_at 2026-04-07T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15283
published_at 2026-04-18T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15422
published_at 2026-04-12T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15461
published_at 2026-04-11T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15497
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15447
published_at 2026-04-08T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.1556
published_at 2026-04-04T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15489
published_at 2026-04-02T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15276
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15358
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2772
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2772
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442326
reference_id 2442326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442326
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:16:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
reference_id mfsa2026-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-14
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-14/
reference_id mfsa2026-14
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:16:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-14/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:16:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:16:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:16:03Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
15
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
16
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
17
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
18
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
19
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
20
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
21
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
22
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
23
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
24
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
25
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
26
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
27
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
28
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
29
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
30
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
31
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
32
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
33
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
34
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
35
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
36
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
37
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
38
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
39
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2014827
reference_id show_bug.cgi?id=2014827
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:16:03Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2014827
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-2772
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xcbn-tkgg-4ben
81
url VCID-xghm-4ygw-tkb2
vulnerability_id VCID-xghm-4ygw-tkb2
summary JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 146, Firefox ESR < 115.31, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14324.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14324.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14324
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.2266
published_at 2026-04-04T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22617
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22585
published_at 2026-04-09T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22531
published_at 2026-04-08T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22449
published_at 2026-04-07T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26673
published_at 2026-04-12T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26717
published_at 2026-04-11T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26557
published_at 2026-04-21T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26595
published_at 2026-04-18T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26624
published_at 2026-04-16T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26616
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14324
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14324
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420517
reference_id 2420517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420517
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:01:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
reference_id mfsa2025-93
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-93/
reference_id mfsa2025-93
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:01:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-93/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:01:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:01:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:01:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
15
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
16
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
17
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
18
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
19
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
20
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
21
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
22
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
23
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
24
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
25
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
26
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
27
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
28
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
29
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
30
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
31
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
32
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
33
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
34
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
35
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
36
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
37
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
38
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
39
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1996840
reference_id show_bug.cgi?id=1996840
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:01:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1996840
41
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2025-14324
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xghm-4ygw-tkb2
82
url VCID-zdxh-fp2e-47dd
vulnerability_id VCID-zdxh-fp2e-47dd
summary Information disclosure in the Networking component. This vulnerability affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0883.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0883.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0883
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03163
published_at 2026-04-21T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03043
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03101
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03094
published_at 2026-04-11T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03131
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03106
published_at 2026-04-08T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.031
published_at 2026-04-04T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03087
published_at 2026-04-02T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03034
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03057
published_at 2026-04-13T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03069
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0883
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0883
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2428968
reference_id 2428968
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2428968
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
reference_id mfsa2026-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-01
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-01/
reference_id mfsa2026-01
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:46:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-01/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:46:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
reference_id mfsa2026-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-04
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-04/
reference_id mfsa2026-04
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:46:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-04/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:46:59Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
13
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
14
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
15
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
16
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
17
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
18
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
19
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
20
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
21
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
22
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
23
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
24
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
25
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
26
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
27
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
28
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
29
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
30
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
31
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
32
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
33
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
34
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
35
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
36
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1989340
reference_id show_bug.cgi?id=1989340
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-13T15:46:59Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1989340
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13he-qsr4-h3d4
1
vulnerability VCID-1fv1-edht-ufag
2
vulnerability VCID-23eu-22t2-cydd
3
vulnerability VCID-26d3-ctnj-7kbh
4
vulnerability VCID-289s-f2w6-53g9
5
vulnerability VCID-351y-4nek-u3aw
6
vulnerability VCID-3grf-hwk1-3fh8
7
vulnerability VCID-3kd3-hwzv-efbn
8
vulnerability VCID-3xgu-7evz-mffw
9
vulnerability VCID-4q6w-tdk9-d3an
10
vulnerability VCID-5dw5-vpt8-zqbz
11
vulnerability VCID-646f-ndeq-5bee
12
vulnerability VCID-675n-7uzz-pqdj
13
vulnerability VCID-77y6-jskt-qucb
14
vulnerability VCID-8qyy-e4jt-rbc4
15
vulnerability VCID-8vka-qus2-tbhj
16
vulnerability VCID-8xek-k5y2-6bfp
17
vulnerability VCID-9ag7-z86d-nba9
18
vulnerability VCID-b4bq-q3ga-3ff1
19
vulnerability VCID-b6sf-z5tm-4uau
20
vulnerability VCID-e2k8-m9sm-8uek
21
vulnerability VCID-f81v-9fv8-93cd
22
vulnerability VCID-ft6u-geds-fua9
23
vulnerability VCID-gkva-6cu9-7keg
24
vulnerability VCID-hshc-4xnc-gug4
25
vulnerability VCID-hstd-23qm-bqdg
26
vulnerability VCID-j1hb-8jjy-tqgq
27
vulnerability VCID-kuwd-6tcg-fuha
28
vulnerability VCID-m6uv-91wz-xfdv
29
vulnerability VCID-mm6w-kpe8-4kg3
30
vulnerability VCID-nvsz-9s3r-nbhq
31
vulnerability VCID-qbzp-euvv-q7c7
32
vulnerability VCID-qkks-24cp-gqg2
33
vulnerability VCID-rp5h-ym8y-skbw
34
vulnerability VCID-t4t3-5pt5-ayds
35
vulnerability VCID-u3j3-fc4f-7ff7
36
vulnerability VCID-wmyy-2cg3-wyhc
37
vulnerability VCID-wqw2-gjvu-6qbu
38
vulnerability VCID-wvx2-pba2-sqha
39
vulnerability VCID-yjc2-2whn-uug5
40
vulnerability VCID-ymak-rv52-h7a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1
aliases CVE-2026-0883
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdxh-fp2e-47dd
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1