Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/firefox@60.3.0-1?arch=el6
Typerpm
Namespaceredhat
Namefirefox
Version60.3.0-1
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-77xm-mea8-n3ec
vulnerability_id VCID-77xm-mea8-n3ec
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12393.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12393
reference_id
reference_type
scores
0
value 0.05776
scoring_system epss
scoring_elements 0.90497
published_at 2026-04-21T12:55:00Z
1
value 0.05776
scoring_system epss
scoring_elements 0.90475
published_at 2026-04-08T12:55:00Z
2
value 0.05776
scoring_system epss
scoring_elements 0.9048
published_at 2026-04-09T12:55:00Z
3
value 0.05776
scoring_system epss
scoring_elements 0.90488
published_at 2026-04-12T12:55:00Z
4
value 0.05776
scoring_system epss
scoring_elements 0.90481
published_at 2026-04-13T12:55:00Z
5
value 0.05776
scoring_system epss
scoring_elements 0.90499
published_at 2026-04-16T12:55:00Z
6
value 0.05776
scoring_system epss
scoring_elements 0.90498
published_at 2026-04-18T12:55:00Z
7
value 0.05776
scoring_system epss
scoring_elements 0.90441
published_at 2026-04-01T12:55:00Z
8
value 0.05776
scoring_system epss
scoring_elements 0.90445
published_at 2026-04-02T12:55:00Z
9
value 0.05776
scoring_system epss
scoring_elements 0.90457
published_at 2026-04-04T12:55:00Z
10
value 0.05776
scoring_system epss
scoring_elements 0.90462
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12393
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1495011
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1495011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
12
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
13
reference_url https://www.debian.org/security/2018/dsa-4324
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4324
14
reference_url https://www.debian.org/security/2018/dsa-4337
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4337
15
reference_url https://www.mozilla.org/security/advisories/mfsa2018-26/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-26/
16
reference_url https://www.mozilla.org/security/advisories/mfsa2018-27/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-27/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2018-28/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-28/
18
reference_url http://www.securityfocus.com/bid/105718
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105718
19
reference_url http://www.securityfocus.com/bid/105769
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105769
20
reference_url http://www.securitytracker.com/id/1041944
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041944
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642183
reference_id 1642183
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642183
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:x86:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:x86:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x86:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x86:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:x86:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:x86:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12393
reference_id CVE-2018-12393
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12393
41
reference_url https://security.gentoo.org/glsa/201811-04
reference_id GLSA-201811-04
reference_type
scores
url https://security.gentoo.org/glsa/201811-04
42
reference_url https://security.gentoo.org/glsa/201811-13
reference_id GLSA-201811-13
reference_type
scores
url https://security.gentoo.org/glsa/201811-13
43
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
reference_id mfsa2018-26
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
44
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
reference_id mfsa2018-27
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
45
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-28
reference_id mfsa2018-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-28
46
reference_url https://access.redhat.com/errata/RHSA-2018:3005
reference_id RHSA-2018:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3005
47
reference_url https://access.redhat.com/errata/RHSA-2018:3006
reference_id RHSA-2018:3006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3006
48
reference_url https://access.redhat.com/errata/RHSA-2018:3531
reference_id RHSA-2018:3531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3531
49
reference_url https://access.redhat.com/errata/RHSA-2018:3532
reference_id RHSA-2018:3532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3532
50
reference_url https://usn.ubuntu.com/3801-1/
reference_id USN-3801-1
reference_type
scores
url https://usn.ubuntu.com/3801-1/
51
reference_url https://usn.ubuntu.com/3868-1/
reference_id USN-3868-1
reference_type
scores
url https://usn.ubuntu.com/3868-1/
fixed_packages
aliases CVE-2018-12393
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-77xm-mea8-n3ec
1
url VCID-8k1r-9djq-h3bh
vulnerability_id VCID-8k1r-9djq-h3bh
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12390.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12390.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12390
reference_id
reference_type
scores
0
value 0.04174
scoring_system epss
scoring_elements 0.88708
published_at 2026-04-21T12:55:00Z
1
value 0.04174
scoring_system epss
scoring_elements 0.88709
published_at 2026-04-18T12:55:00Z
2
value 0.07182
scoring_system epss
scoring_elements 0.91545
published_at 2026-04-02T12:55:00Z
3
value 0.07182
scoring_system epss
scoring_elements 0.91538
published_at 2026-04-01T12:55:00Z
4
value 0.07182
scoring_system epss
scoring_elements 0.91552
published_at 2026-04-04T12:55:00Z
5
value 0.07182
scoring_system epss
scoring_elements 0.9156
published_at 2026-04-07T12:55:00Z
6
value 0.07182
scoring_system epss
scoring_elements 0.91573
published_at 2026-04-08T12:55:00Z
7
value 0.07182
scoring_system epss
scoring_elements 0.91579
published_at 2026-04-09T12:55:00Z
8
value 0.07182
scoring_system epss
scoring_elements 0.91583
published_at 2026-04-13T12:55:00Z
9
value 0.07182
scoring_system epss
scoring_elements 0.91585
published_at 2026-04-12T12:55:00Z
10
value 0.07182
scoring_system epss
scoring_elements 0.91605
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12390
2
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
12
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
13
reference_url https://www.debian.org/security/2018/dsa-4324
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4324
14
reference_url https://www.debian.org/security/2018/dsa-4337
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4337
15
reference_url https://www.mozilla.org/security/advisories/mfsa2018-26/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-26/
16
reference_url https://www.mozilla.org/security/advisories/mfsa2018-27/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-27/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2018-28/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-28/
18
reference_url http://www.securityfocus.com/bid/105718
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105718
19
reference_url http://www.securityfocus.com/bid/105769
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105769
20
reference_url http://www.securitytracker.com/id/1041944
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041944
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642180
reference_id 1642180
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642180
22
reference_url https://security.archlinux.org/ASA-201810-14
reference_id ASA-201810-14
reference_type
scores
url https://security.archlinux.org/ASA-201810-14
23
reference_url https://security.archlinux.org/ASA-201811-10
reference_id ASA-201811-10
reference_type
scores
url https://security.archlinux.org/ASA-201811-10
24
reference_url https://security.archlinux.org/AVG-787
reference_id AVG-787
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-787
25
reference_url https://security.archlinux.org/AVG-803
reference_id AVG-803
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-803
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12390
reference_id CVE-2018-12390
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12390
45
reference_url https://security.gentoo.org/glsa/201811-04
reference_id GLSA-201811-04
reference_type
scores
url https://security.gentoo.org/glsa/201811-04
46
reference_url https://security.gentoo.org/glsa/201811-13
reference_id GLSA-201811-13
reference_type
scores
url https://security.gentoo.org/glsa/201811-13
47
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
reference_id mfsa2018-26
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
48
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
reference_id mfsa2018-27
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
49
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-28
reference_id mfsa2018-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-28
50
reference_url https://access.redhat.com/errata/RHSA-2018:3005
reference_id RHSA-2018:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3005
51
reference_url https://access.redhat.com/errata/RHSA-2018:3006
reference_id RHSA-2018:3006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3006
52
reference_url https://access.redhat.com/errata/RHSA-2018:3531
reference_id RHSA-2018:3531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3531
53
reference_url https://access.redhat.com/errata/RHSA-2018:3532
reference_id RHSA-2018:3532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3532
54
reference_url https://usn.ubuntu.com/3801-1/
reference_id USN-3801-1
reference_type
scores
url https://usn.ubuntu.com/3801-1/
55
reference_url https://usn.ubuntu.com/3868-1/
reference_id USN-3868-1
reference_type
scores
url https://usn.ubuntu.com/3868-1/
fixed_packages
aliases CVE-2018-12390
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8k1r-9djq-h3bh
2
url VCID-ctgf-rds5-4fda
vulnerability_id VCID-ctgf-rds5-4fda
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12396.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12396
reference_id
reference_type
scores
0
value 0.01138
scoring_system epss
scoring_elements 0.78421
published_at 2026-04-21T12:55:00Z
1
value 0.01138
scoring_system epss
scoring_elements 0.78396
published_at 2026-04-09T12:55:00Z
2
value 0.01138
scoring_system epss
scoring_elements 0.78422
published_at 2026-04-11T12:55:00Z
3
value 0.01138
scoring_system epss
scoring_elements 0.78405
published_at 2026-04-12T12:55:00Z
4
value 0.01138
scoring_system epss
scoring_elements 0.78397
published_at 2026-04-13T12:55:00Z
5
value 0.01138
scoring_system epss
scoring_elements 0.78426
published_at 2026-04-16T12:55:00Z
6
value 0.01138
scoring_system epss
scoring_elements 0.78425
published_at 2026-04-18T12:55:00Z
7
value 0.01138
scoring_system epss
scoring_elements 0.78343
published_at 2026-04-01T12:55:00Z
8
value 0.01138
scoring_system epss
scoring_elements 0.7835
published_at 2026-04-02T12:55:00Z
9
value 0.01138
scoring_system epss
scoring_elements 0.78381
published_at 2026-04-04T12:55:00Z
10
value 0.01138
scoring_system epss
scoring_elements 0.78364
published_at 2026-04-07T12:55:00Z
11
value 0.01138
scoring_system epss
scoring_elements 0.78391
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12396
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1483602
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1483602
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
12
reference_url https://www.debian.org/security/2018/dsa-4324
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4324
13
reference_url https://www.mozilla.org/security/advisories/mfsa2018-26/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-26/
14
reference_url https://www.mozilla.org/security/advisories/mfsa2018-27/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-27/
15
reference_url http://www.securityfocus.com/bid/105718
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105718
16
reference_url http://www.securitytracker.com/id/1041944
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041944
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642186
reference_id 1642186
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642186
18
reference_url https://security.archlinux.org/ASA-201810-14
reference_id ASA-201810-14
reference_type
scores
url https://security.archlinux.org/ASA-201810-14
19
reference_url https://security.archlinux.org/AVG-787
reference_id AVG-787
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-787
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12396
reference_id CVE-2018-12396
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-12396
38
reference_url https://security.gentoo.org/glsa/201811-04
reference_id GLSA-201811-04
reference_type
scores
url https://security.gentoo.org/glsa/201811-04
39
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
reference_id mfsa2018-26
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
40
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
reference_id mfsa2018-27
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
41
reference_url https://access.redhat.com/errata/RHSA-2018:3005
reference_id RHSA-2018:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3005
42
reference_url https://access.redhat.com/errata/RHSA-2018:3006
reference_id RHSA-2018:3006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3006
43
reference_url https://usn.ubuntu.com/3801-1/
reference_id USN-3801-1
reference_type
scores
url https://usn.ubuntu.com/3801-1/
fixed_packages
aliases CVE-2018-12396
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctgf-rds5-4fda
3
url VCID-cx4p-6ywa-hbec
vulnerability_id VCID-cx4p-6ywa-hbec
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12389.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12389.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12389
reference_id
reference_type
scores
0
value 0.01766
scoring_system epss
scoring_elements 0.82668
published_at 2026-04-21T12:55:00Z
1
value 0.01766
scoring_system epss
scoring_elements 0.82637
published_at 2026-04-11T12:55:00Z
2
value 0.01766
scoring_system epss
scoring_elements 0.82631
published_at 2026-04-12T12:55:00Z
3
value 0.01766
scoring_system epss
scoring_elements 0.82627
published_at 2026-04-13T12:55:00Z
4
value 0.01766
scoring_system epss
scoring_elements 0.82664
published_at 2026-04-16T12:55:00Z
5
value 0.01766
scoring_system epss
scoring_elements 0.82665
published_at 2026-04-18T12:55:00Z
6
value 0.01766
scoring_system epss
scoring_elements 0.82558
published_at 2026-04-01T12:55:00Z
7
value 0.01766
scoring_system epss
scoring_elements 0.82573
published_at 2026-04-02T12:55:00Z
8
value 0.01766
scoring_system epss
scoring_elements 0.82589
published_at 2026-04-04T12:55:00Z
9
value 0.01766
scoring_system epss
scoring_elements 0.82584
published_at 2026-04-07T12:55:00Z
10
value 0.01766
scoring_system epss
scoring_elements 0.82611
published_at 2026-04-08T12:55:00Z
11
value 0.01766
scoring_system epss
scoring_elements 0.82619
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12389
2
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1498460%2C1499198
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1498460%2C1499198
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
10
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
11
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
12
reference_url https://www.debian.org/security/2018/dsa-4324
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4324
13
reference_url https://www.debian.org/security/2018/dsa-4337
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4337
14
reference_url https://www.mozilla.org/security/advisories/mfsa2018-27/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-27/
15
reference_url https://www.mozilla.org/security/advisories/mfsa2018-28/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-28/
16
reference_url http://www.securityfocus.com/bid/105723
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105723
17
reference_url http://www.securityfocus.com/bid/105769
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105769
18
reference_url http://www.securitytracker.com/id/1041944
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041944
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642179
reference_id 1642179
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642179
20
reference_url https://security.archlinux.org/ASA-201811-10
reference_id ASA-201811-10
reference_type
scores
url https://security.archlinux.org/ASA-201811-10
21
reference_url https://security.archlinux.org/AVG-803
reference_id AVG-803
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-803
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12389
reference_id CVE-2018-12389
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12389
41
reference_url https://security.gentoo.org/glsa/201811-04
reference_id GLSA-201811-04
reference_type
scores
url https://security.gentoo.org/glsa/201811-04
42
reference_url https://security.gentoo.org/glsa/201811-13
reference_id GLSA-201811-13
reference_type
scores
url https://security.gentoo.org/glsa/201811-13
43
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
reference_id mfsa2018-27
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
44
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-28
reference_id mfsa2018-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-28
45
reference_url https://access.redhat.com/errata/RHSA-2018:3005
reference_id RHSA-2018:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3005
46
reference_url https://access.redhat.com/errata/RHSA-2018:3006
reference_id RHSA-2018:3006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3006
47
reference_url https://access.redhat.com/errata/RHSA-2018:3531
reference_id RHSA-2018:3531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3531
48
reference_url https://access.redhat.com/errata/RHSA-2018:3532
reference_id RHSA-2018:3532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3532
49
reference_url https://usn.ubuntu.com/3868-1/
reference_id USN-3868-1
reference_type
scores
url https://usn.ubuntu.com/3868-1/
fixed_packages
aliases CVE-2018-12389
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cx4p-6ywa-hbec
4
url VCID-eyf6-1map-zbdz
vulnerability_id VCID-eyf6-1map-zbdz
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12395.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12395.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12395
reference_id
reference_type
scores
0
value 0.02916
scoring_system epss
scoring_elements 0.86397
published_at 2026-04-21T12:55:00Z
1
value 0.02916
scoring_system epss
scoring_elements 0.86376
published_at 2026-04-09T12:55:00Z
2
value 0.02916
scoring_system epss
scoring_elements 0.8639
published_at 2026-04-11T12:55:00Z
3
value 0.02916
scoring_system epss
scoring_elements 0.86388
published_at 2026-04-12T12:55:00Z
4
value 0.02916
scoring_system epss
scoring_elements 0.86382
published_at 2026-04-13T12:55:00Z
5
value 0.02916
scoring_system epss
scoring_elements 0.86399
published_at 2026-04-16T12:55:00Z
6
value 0.02916
scoring_system epss
scoring_elements 0.86404
published_at 2026-04-18T12:55:00Z
7
value 0.02916
scoring_system epss
scoring_elements 0.86318
published_at 2026-04-01T12:55:00Z
8
value 0.02916
scoring_system epss
scoring_elements 0.86329
published_at 2026-04-02T12:55:00Z
9
value 0.02916
scoring_system epss
scoring_elements 0.86347
published_at 2026-04-04T12:55:00Z
10
value 0.02916
scoring_system epss
scoring_elements 0.86348
published_at 2026-04-07T12:55:00Z
11
value 0.02916
scoring_system epss
scoring_elements 0.86366
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12395
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1467523
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1467523
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
12
reference_url https://www.debian.org/security/2018/dsa-4324
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4324
13
reference_url https://www.mozilla.org/security/advisories/mfsa2018-26/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-26/
14
reference_url https://www.mozilla.org/security/advisories/mfsa2018-27/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-27/
15
reference_url http://www.securityfocus.com/bid/105718
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105718
16
reference_url http://www.securitytracker.com/id/1041944
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041944
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642185
reference_id 1642185
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642185
18
reference_url https://security.archlinux.org/ASA-201810-14
reference_id ASA-201810-14
reference_type
scores
url https://security.archlinux.org/ASA-201810-14
19
reference_url https://security.archlinux.org/AVG-787
reference_id AVG-787
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-787
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12395
reference_id CVE-2018-12395
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-12395
36
reference_url https://security.gentoo.org/glsa/201811-04
reference_id GLSA-201811-04
reference_type
scores
url https://security.gentoo.org/glsa/201811-04
37
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
reference_id mfsa2018-26
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
38
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
reference_id mfsa2018-27
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
39
reference_url https://access.redhat.com/errata/RHSA-2018:3005
reference_id RHSA-2018:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3005
40
reference_url https://access.redhat.com/errata/RHSA-2018:3006
reference_id RHSA-2018:3006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3006
41
reference_url https://usn.ubuntu.com/3801-1/
reference_id USN-3801-1
reference_type
scores
url https://usn.ubuntu.com/3801-1/
fixed_packages
aliases CVE-2018-12395
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eyf6-1map-zbdz
5
url VCID-qq7q-7j4q-h7dz
vulnerability_id VCID-qq7q-7j4q-h7dz
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12397.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12397.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12397
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20873
published_at 2026-04-21T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20919
published_at 2026-04-08T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.2098
published_at 2026-04-09T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20998
published_at 2026-04-11T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20954
published_at 2026-04-12T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20901
published_at 2026-04-13T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20892
published_at 2026-04-18T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20921
published_at 2026-04-01T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.21072
published_at 2026-04-02T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21125
published_at 2026-04-04T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20839
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12397
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1487478
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1487478
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
12
reference_url https://www.debian.org/security/2018/dsa-4324
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4324
13
reference_url https://www.mozilla.org/security/advisories/mfsa2018-26/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-26/
14
reference_url https://www.mozilla.org/security/advisories/mfsa2018-27/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-27/
15
reference_url http://www.securityfocus.com/bid/105718
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105718
16
reference_url http://www.securitytracker.com/id/1041944
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041944
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642187
reference_id 1642187
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642187
18
reference_url https://security.archlinux.org/ASA-201810-14
reference_id ASA-201810-14
reference_type
scores
url https://security.archlinux.org/ASA-201810-14
19
reference_url https://security.archlinux.org/AVG-787
reference_id AVG-787
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-787
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12397
reference_id CVE-2018-12397
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:N
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-12397
35
reference_url https://security.gentoo.org/glsa/201811-04
reference_id GLSA-201811-04
reference_type
scores
url https://security.gentoo.org/glsa/201811-04
36
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
reference_id mfsa2018-26
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
37
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
reference_id mfsa2018-27
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
38
reference_url https://access.redhat.com/errata/RHSA-2018:3005
reference_id RHSA-2018:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3005
39
reference_url https://access.redhat.com/errata/RHSA-2018:3006
reference_id RHSA-2018:3006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3006
40
reference_url https://usn.ubuntu.com/3801-1/
reference_id USN-3801-1
reference_type
scores
url https://usn.ubuntu.com/3801-1/
fixed_packages
aliases CVE-2018-12397
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qq7q-7j4q-h7dz
6
url VCID-r7vv-451v-nbag
vulnerability_id VCID-r7vv-451v-nbag
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12392.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12392
reference_id
reference_type
scores
0
value 0.07848
scoring_system epss
scoring_elements 0.9201
published_at 2026-04-21T12:55:00Z
1
value 0.07848
scoring_system epss
scoring_elements 0.91977
published_at 2026-04-04T12:55:00Z
2
value 0.07848
scoring_system epss
scoring_elements 0.91983
published_at 2026-04-07T12:55:00Z
3
value 0.07848
scoring_system epss
scoring_elements 0.91995
published_at 2026-04-08T12:55:00Z
4
value 0.07848
scoring_system epss
scoring_elements 0.91999
published_at 2026-04-09T12:55:00Z
5
value 0.07848
scoring_system epss
scoring_elements 0.92002
published_at 2026-04-12T12:55:00Z
6
value 0.07848
scoring_system epss
scoring_elements 0.91998
published_at 2026-04-13T12:55:00Z
7
value 0.07848
scoring_system epss
scoring_elements 0.92016
published_at 2026-04-16T12:55:00Z
8
value 0.07848
scoring_system epss
scoring_elements 0.92013
published_at 2026-04-18T12:55:00Z
9
value 0.07848
scoring_system epss
scoring_elements 0.91961
published_at 2026-04-01T12:55:00Z
10
value 0.07848
scoring_system epss
scoring_elements 0.91969
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12392
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1492823
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1492823
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
12
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
13
reference_url https://www.debian.org/security/2018/dsa-4324
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4324
14
reference_url https://www.debian.org/security/2018/dsa-4337
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4337
15
reference_url https://www.mozilla.org/security/advisories/mfsa2018-26/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-26/
16
reference_url https://www.mozilla.org/security/advisories/mfsa2018-27/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-27/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2018-28/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-28/
18
reference_url http://www.securityfocus.com/bid/105718
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105718
19
reference_url http://www.securityfocus.com/bid/105769
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105769
20
reference_url http://www.securitytracker.com/id/1041944
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041944
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642182
reference_id 1642182
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642182
22
reference_url https://security.archlinux.org/ASA-201810-14
reference_id ASA-201810-14
reference_type
scores
url https://security.archlinux.org/ASA-201810-14
23
reference_url https://security.archlinux.org/ASA-201811-10
reference_id ASA-201811-10
reference_type
scores
url https://security.archlinux.org/ASA-201811-10
24
reference_url https://security.archlinux.org/AVG-787
reference_id AVG-787
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-787
25
reference_url https://security.archlinux.org/AVG-803
reference_id AVG-803
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-803
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12392
reference_id CVE-2018-12392
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12392
45
reference_url https://security.gentoo.org/glsa/201811-04
reference_id GLSA-201811-04
reference_type
scores
url https://security.gentoo.org/glsa/201811-04
46
reference_url https://security.gentoo.org/glsa/201811-13
reference_id GLSA-201811-13
reference_type
scores
url https://security.gentoo.org/glsa/201811-13
47
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
reference_id mfsa2018-26
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
48
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
reference_id mfsa2018-27
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-27
49
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-28
reference_id mfsa2018-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-28
50
reference_url https://access.redhat.com/errata/RHSA-2018:3005
reference_id RHSA-2018:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3005
51
reference_url https://access.redhat.com/errata/RHSA-2018:3006
reference_id RHSA-2018:3006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3006
52
reference_url https://access.redhat.com/errata/RHSA-2018:3531
reference_id RHSA-2018:3531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3531
53
reference_url https://access.redhat.com/errata/RHSA-2018:3532
reference_id RHSA-2018:3532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3532
54
reference_url https://usn.ubuntu.com/3801-1/
reference_id USN-3801-1
reference_type
scores
url https://usn.ubuntu.com/3801-1/
55
reference_url https://usn.ubuntu.com/3868-1/
reference_id USN-3868-1
reference_type
scores
url https://usn.ubuntu.com/3868-1/
fixed_packages
aliases CVE-2018-12392
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r7vv-451v-nbag
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@60.3.0-1%3Farch=el6