Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/firefox@54.0.1-1
Typealpm
Namespacearchlinux
Namefirefox
Version54.0.1-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version55.0-1
Latest_non_vulnerable_version101.0-1
Affected_by_vulnerabilities
0
url VCID-39za-a75a-z7c3
vulnerability_id VCID-39za-a75a-z7c3
summary On Linux systems, if the content process is compromised, the sandbox broker will allow files to be truncated even though the sandbox explicitly only has read access to the local file system and no write permissions. *Note: This attack only affects the Linux operating system. Other operating systems are not affected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7794.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7794.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7794
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14221
published_at 2026-04-01T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14125
published_at 2026-04-21T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14306
published_at 2026-04-09T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14253
published_at 2026-04-11T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14215
published_at 2026-04-12T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14158
published_at 2026-04-13T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14049
published_at 2026-04-16T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14048
published_at 2026-04-18T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14299
published_at 2026-04-02T12:55:00Z
9
value 0.00046
scoring_system epss
scoring_elements 0.14362
published_at 2026-04-04T12:55:00Z
10
value 0.00046
scoring_system epss
scoring_elements 0.1417
published_at 2026-04-07T12:55:00Z
11
value 0.00046
scoring_system epss
scoring_elements 0.14252
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7794
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1374281
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1374281
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:C/A:C
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
5
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479211
reference_id 1479211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479211
7
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
8
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7794
reference_id CVE-2017-7794
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7794
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
13
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7794
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-39za-a75a-z7c3
1
url VCID-3cbn-278y-hkah
vulnerability_id VCID-3cbn-278y-hkah
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7784.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7784.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7784
reference_id
reference_type
scores
0
value 0.05217
scoring_system epss
scoring_elements 0.89955
published_at 2026-04-21T12:55:00Z
1
value 0.05217
scoring_system epss
scoring_elements 0.89959
published_at 2026-04-18T12:55:00Z
2
value 0.05217
scoring_system epss
scoring_elements 0.89901
published_at 2026-04-01T12:55:00Z
3
value 0.05217
scoring_system epss
scoring_elements 0.89958
published_at 2026-04-16T12:55:00Z
4
value 0.05217
scoring_system epss
scoring_elements 0.89951
published_at 2026-04-12T12:55:00Z
5
value 0.05217
scoring_system epss
scoring_elements 0.89953
published_at 2026-04-11T12:55:00Z
6
value 0.05217
scoring_system epss
scoring_elements 0.89945
published_at 2026-04-13T12:55:00Z
7
value 0.05217
scoring_system epss
scoring_elements 0.89917
published_at 2026-04-04T12:55:00Z
8
value 0.05217
scoring_system epss
scoring_elements 0.89923
published_at 2026-04-07T12:55:00Z
9
value 0.05217
scoring_system epss
scoring_elements 0.8994
published_at 2026-04-08T12:55:00Z
10
value 0.05217
scoring_system epss
scoring_elements 0.89904
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7784
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1376087
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1376087
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100202
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100202
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479201
reference_id 1479201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479201
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7784
reference_id CVE-2017-7784
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7784
54
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
55
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
58
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
59
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
60
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
61
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
62
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7784
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3cbn-278y-hkah
2
url VCID-48em-7yxs-pqf9
vulnerability_id VCID-48em-7yxs-pqf9
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7779.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7779
reference_id
reference_type
scores
0
value 0.01104
scoring_system epss
scoring_elements 0.78106
published_at 2026-04-21T12:55:00Z
1
value 0.01104
scoring_system epss
scoring_elements 0.78112
published_at 2026-04-18T12:55:00Z
2
value 0.02073
scoring_system epss
scoring_elements 0.839
published_at 2026-04-02T12:55:00Z
3
value 0.02073
scoring_system epss
scoring_elements 0.83886
published_at 2026-04-01T12:55:00Z
4
value 0.02073
scoring_system epss
scoring_elements 0.83916
published_at 2026-04-04T12:55:00Z
5
value 0.02073
scoring_system epss
scoring_elements 0.83919
published_at 2026-04-07T12:55:00Z
6
value 0.02073
scoring_system epss
scoring_elements 0.83943
published_at 2026-04-08T12:55:00Z
7
value 0.02073
scoring_system epss
scoring_elements 0.83949
published_at 2026-04-09T12:55:00Z
8
value 0.02073
scoring_system epss
scoring_elements 0.83965
published_at 2026-04-11T12:55:00Z
9
value 0.02073
scoring_system epss
scoring_elements 0.83959
published_at 2026-04-12T12:55:00Z
10
value 0.02073
scoring_system epss
scoring_elements 0.83955
published_at 2026-04-13T12:55:00Z
11
value 0.02073
scoring_system epss
scoring_elements 0.83979
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7779
2
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1354443%2C1368576%2C1366903%2C1369913%2C1371424%2C1346590%2C1371890%2C1372985%2C1362924%2C1368105%2C1369994%2C1371283%2C1368362%2C1378826%2C1380426%2C1368030%2C1373220%2C1321384%2C1383002
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1354443%2C1368576%2C1366903%2C1369913%2C1371424%2C1346590%2C1371890%2C1372985%2C1362924%2C1368105%2C1369994%2C1371283%2C1368362%2C1378826%2C1380426%2C1368030%2C1373220%2C1321384%2C1383002
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100201
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100201
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479191
reference_id 1479191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479191
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7779
reference_id CVE-2017-7779
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7779
45
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
46
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
47
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
48
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
49
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
50
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
51
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
52
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
53
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7779
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-48em-7yxs-pqf9
3
url VCID-4rt5-58ue-sufc
vulnerability_id VCID-4rt5-58ue-sufc
summary Mozilla developers and community members Gary Kwong, Christian Holler, André Bargull, Bob Clary, Carsten Book, Emilio Cobos Álvarez, Masayuki Nakano, Sebastian Hengst, Franziskus Kiefer, Tyson Smith, and Ronald Crane reported memory safety bugs present in Firefox 54. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7780.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7780
reference_id
reference_type
scores
0
value 0.01811
scoring_system epss
scoring_elements 0.82765
published_at 2026-04-01T12:55:00Z
1
value 0.01811
scoring_system epss
scoring_elements 0.82871
published_at 2026-04-21T12:55:00Z
2
value 0.01811
scoring_system epss
scoring_elements 0.82816
published_at 2026-04-08T12:55:00Z
3
value 0.01811
scoring_system epss
scoring_elements 0.82822
published_at 2026-04-09T12:55:00Z
4
value 0.01811
scoring_system epss
scoring_elements 0.82839
published_at 2026-04-11T12:55:00Z
5
value 0.01811
scoring_system epss
scoring_elements 0.82834
published_at 2026-04-12T12:55:00Z
6
value 0.01811
scoring_system epss
scoring_elements 0.8283
published_at 2026-04-13T12:55:00Z
7
value 0.01811
scoring_system epss
scoring_elements 0.82869
published_at 2026-04-18T12:55:00Z
8
value 0.01811
scoring_system epss
scoring_elements 0.82781
published_at 2026-04-02T12:55:00Z
9
value 0.01811
scoring_system epss
scoring_elements 0.82795
published_at 2026-04-04T12:55:00Z
10
value 0.01811
scoring_system epss
scoring_elements 0.82791
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7780
2
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1353763%2C1353356%2C1370070%2C1375435%2C1373663%2C1363150%2C1370817%2C1273678%2C1367850%2C1347968%2C1361749%2C1349138%2C1371982%2C1344666%2C1369836%2C1330739%2C1371511%2C1371484
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1353763%2C1353356%2C1370070%2C1375435%2C1373663%2C1363150%2C1370817%2C1273678%2C1367850%2C1347968%2C1361749%2C1349138%2C1371982%2C1344666%2C1369836%2C1330739%2C1371511%2C1371484
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
5
reference_url http://www.securityfocus.com/bid/100199
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100199
6
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479196
reference_id 1479196
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479196
8
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
9
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7780
reference_id CVE-2017-7780
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7780
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
13
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7780
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4rt5-58ue-sufc
4
url VCID-6aqn-abjb-skbd
vulnerability_id VCID-6aqn-abjb-skbd
summary If a server sends two Strict-Transport-Security (STS) headers for a single connection, they will be rejected as invalid and HTTP Strict Transport Security (HSTS) will not be enabled for the connection.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7789.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7789.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7789
reference_id
reference_type
scores
0
value 0.00769
scoring_system epss
scoring_elements 0.73455
published_at 2026-04-01T12:55:00Z
1
value 0.00769
scoring_system epss
scoring_elements 0.73551
published_at 2026-04-21T12:55:00Z
2
value 0.00769
scoring_system epss
scoring_elements 0.73508
published_at 2026-04-09T12:55:00Z
3
value 0.00769
scoring_system epss
scoring_elements 0.73532
published_at 2026-04-11T12:55:00Z
4
value 0.00769
scoring_system epss
scoring_elements 0.73512
published_at 2026-04-12T12:55:00Z
5
value 0.00769
scoring_system epss
scoring_elements 0.73505
published_at 2026-04-13T12:55:00Z
6
value 0.00769
scoring_system epss
scoring_elements 0.73548
published_at 2026-04-16T12:55:00Z
7
value 0.00769
scoring_system epss
scoring_elements 0.73557
published_at 2026-04-18T12:55:00Z
8
value 0.00769
scoring_system epss
scoring_elements 0.73463
published_at 2026-04-02T12:55:00Z
9
value 0.00769
scoring_system epss
scoring_elements 0.73486
published_at 2026-04-04T12:55:00Z
10
value 0.00769
scoring_system epss
scoring_elements 0.73458
published_at 2026-04-07T12:55:00Z
11
value 0.00769
scoring_system epss
scoring_elements 0.73495
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7789
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1074642
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1074642
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
5
reference_url http://www.securityfocus.com/bid/100374
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100374
6
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479208
reference_id 1479208
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479208
8
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
9
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7789
reference_id CVE-2017-7789
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7789
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
13
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7789
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6aqn-abjb-skbd
5
url VCID-7mvz-mr2e-hyfx
vulnerability_id VCID-7mvz-mr2e-hyfx
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7787.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7787.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7787
reference_id
reference_type
scores
0
value 0.00979
scoring_system epss
scoring_elements 0.76784
published_at 2026-04-21T12:55:00Z
1
value 0.00979
scoring_system epss
scoring_elements 0.76793
published_at 2026-04-18T12:55:00Z
2
value 0.00979
scoring_system epss
scoring_elements 0.76689
published_at 2026-04-01T12:55:00Z
3
value 0.00979
scoring_system epss
scoring_elements 0.76788
published_at 2026-04-16T12:55:00Z
4
value 0.00979
scoring_system epss
scoring_elements 0.76755
published_at 2026-04-12T12:55:00Z
5
value 0.00979
scoring_system epss
scoring_elements 0.76775
published_at 2026-04-11T12:55:00Z
6
value 0.00979
scoring_system epss
scoring_elements 0.76747
published_at 2026-04-13T12:55:00Z
7
value 0.00979
scoring_system epss
scoring_elements 0.76722
published_at 2026-04-04T12:55:00Z
8
value 0.00979
scoring_system epss
scoring_elements 0.76704
published_at 2026-04-07T12:55:00Z
9
value 0.00979
scoring_system epss
scoring_elements 0.76736
published_at 2026-04-08T12:55:00Z
10
value 0.00979
scoring_system epss
scoring_elements 0.76693
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7787
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1322896
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1322896
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:N/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100234
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100234
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479206
reference_id 1479206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479206
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7787
reference_id CVE-2017-7787
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7787
54
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
55
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
58
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
59
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
60
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
61
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
62
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7787
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7mvz-mr2e-hyfx
6
url VCID-9cje-24ah-p7fk
vulnerability_id VCID-9cje-24ah-p7fk
summary A content security policy (CSP) frame-ancestors directive containing origins with paths allows for comparisons against those paths instead of the origin. This results in a cross-origin information leak of this path information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7808.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7808
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31684
published_at 2026-04-01T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31665
published_at 2026-04-21T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31761
published_at 2026-04-09T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31764
published_at 2026-04-11T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31724
published_at 2026-04-12T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31688
published_at 2026-04-13T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.3172
published_at 2026-04-16T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31698
published_at 2026-04-18T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31816
published_at 2026-04-02T12:55:00Z
9
value 0.00125
scoring_system epss
scoring_elements 0.3186
published_at 2026-04-04T12:55:00Z
10
value 0.00125
scoring_system epss
scoring_elements 0.31679
published_at 2026-04-07T12:55:00Z
11
value 0.00125
scoring_system epss
scoring_elements 0.31731
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7808
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1367531
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1367531
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
5
reference_url http://www.securityfocus.com/bid/100373
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100373
6
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479228
reference_id 1479228
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479228
8
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
9
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7808
reference_id CVE-2017-7808
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7808
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
13
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7808
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9cje-24ah-p7fk
7
url VCID-d7jf-wx4p-cuek
vulnerability_id VCID-d7jf-wx4p-cuek
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7807.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7807
reference_id
reference_type
scores
0
value 0.00778
scoring_system epss
scoring_elements 0.73698
published_at 2026-04-18T12:55:00Z
1
value 0.00778
scoring_system epss
scoring_elements 0.73689
published_at 2026-04-21T12:55:00Z
2
value 0.00778
scoring_system epss
scoring_elements 0.73594
published_at 2026-04-01T12:55:00Z
3
value 0.00778
scoring_system epss
scoring_elements 0.73645
published_at 2026-04-13T12:55:00Z
4
value 0.00778
scoring_system epss
scoring_elements 0.73653
published_at 2026-04-12T12:55:00Z
5
value 0.00778
scoring_system epss
scoring_elements 0.73671
published_at 2026-04-11T12:55:00Z
6
value 0.00778
scoring_system epss
scoring_elements 0.73648
published_at 2026-04-09T12:55:00Z
7
value 0.00778
scoring_system epss
scoring_elements 0.73627
published_at 2026-04-04T12:55:00Z
8
value 0.00778
scoring_system epss
scoring_elements 0.736
published_at 2026-04-07T12:55:00Z
9
value 0.00778
scoring_system epss
scoring_elements 0.73636
published_at 2026-04-08T12:55:00Z
10
value 0.00778
scoring_system epss
scoring_elements 0.73603
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7807
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1376459
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1376459
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100242
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100242
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479227
reference_id 1479227
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479227
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7807
reference_id CVE-2017-7807
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7807
49
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
50
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
51
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
54
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
55
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
56
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
57
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7807
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d7jf-wx4p-cuek
8
url VCID-dck1-2x3v-1ygr
vulnerability_id VCID-dck1-2x3v-1ygr
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7792.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7792.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7792
reference_id
reference_type
scores
0
value 0.07363
scoring_system epss
scoring_elements 0.91731
published_at 2026-04-21T12:55:00Z
1
value 0.07363
scoring_system epss
scoring_elements 0.91686
published_at 2026-04-04T12:55:00Z
2
value 0.07363
scoring_system epss
scoring_elements 0.91695
published_at 2026-04-07T12:55:00Z
3
value 0.07363
scoring_system epss
scoring_elements 0.91708
published_at 2026-04-08T12:55:00Z
4
value 0.07363
scoring_system epss
scoring_elements 0.91715
published_at 2026-04-09T12:55:00Z
5
value 0.07363
scoring_system epss
scoring_elements 0.91718
published_at 2026-04-11T12:55:00Z
6
value 0.07363
scoring_system epss
scoring_elements 0.9172
published_at 2026-04-12T12:55:00Z
7
value 0.07363
scoring_system epss
scoring_elements 0.91716
published_at 2026-04-13T12:55:00Z
8
value 0.07363
scoring_system epss
scoring_elements 0.91737
published_at 2026-04-16T12:55:00Z
9
value 0.07363
scoring_system epss
scoring_elements 0.91729
published_at 2026-04-18T12:55:00Z
10
value 0.07363
scoring_system epss
scoring_elements 0.91673
published_at 2026-04-01T12:55:00Z
11
value 0.07363
scoring_system epss
scoring_elements 0.91681
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7792
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1368652
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1368652
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100206
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100206
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479210
reference_id 1479210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479210
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7792
reference_id CVE-2017-7792
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7792
53
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
54
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
58
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
59
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
60
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
61
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7792
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dck1-2x3v-1ygr
9
url VCID-eaau-g1uf-73gd
vulnerability_id VCID-eaau-g1uf-73gd
summary A use-after-free vulnerability can occur when the layer manager is freed too early when rendering specific SVG content, resulting in a potentially exploitable crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7806.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7806
reference_id
reference_type
scores
0
value 0.01719
scoring_system epss
scoring_elements 0.82321
published_at 2026-04-01T12:55:00Z
1
value 0.01719
scoring_system epss
scoring_elements 0.82431
published_at 2026-04-21T12:55:00Z
2
value 0.01719
scoring_system epss
scoring_elements 0.82375
published_at 2026-04-08T12:55:00Z
3
value 0.01719
scoring_system epss
scoring_elements 0.82382
published_at 2026-04-09T12:55:00Z
4
value 0.01719
scoring_system epss
scoring_elements 0.82401
published_at 2026-04-11T12:55:00Z
5
value 0.01719
scoring_system epss
scoring_elements 0.82397
published_at 2026-04-12T12:55:00Z
6
value 0.01719
scoring_system epss
scoring_elements 0.82392
published_at 2026-04-13T12:55:00Z
7
value 0.01719
scoring_system epss
scoring_elements 0.82426
published_at 2026-04-18T12:55:00Z
8
value 0.01719
scoring_system epss
scoring_elements 0.82335
published_at 2026-04-02T12:55:00Z
9
value 0.01719
scoring_system epss
scoring_elements 0.82353
published_at 2026-04-04T12:55:00Z
10
value 0.01719
scoring_system epss
scoring_elements 0.82348
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7806
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1378113
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1378113
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
5
reference_url http://www.securityfocus.com/bid/100389
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100389
6
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479226
reference_id 1479226
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479226
8
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
9
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7806
reference_id CVE-2017-7806
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7806
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
13
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7806
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eaau-g1uf-73gd
10
url VCID-f7ut-fqny-tffr
vulnerability_id VCID-f7ut-fqny-tffr
summary JavaScript in the about:webrtc page is not sanitized properly being assigned to innerHTML. Data on this page is supplied by WebRTC usage and is not under third-party control, making this difficult to exploit, but the vulnerability could possibly be used for a cross-site scripting (XSS) attack.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7799.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7799
reference_id
reference_type
scores
0
value 0.00495
scoring_system epss
scoring_elements 0.65691
published_at 2026-04-01T12:55:00Z
1
value 0.00495
scoring_system epss
scoring_elements 0.65824
published_at 2026-04-18T12:55:00Z
2
value 0.00495
scoring_system epss
scoring_elements 0.65789
published_at 2026-04-08T12:55:00Z
3
value 0.00495
scoring_system epss
scoring_elements 0.65799
published_at 2026-04-09T12:55:00Z
4
value 0.00495
scoring_system epss
scoring_elements 0.6582
published_at 2026-04-11T12:55:00Z
5
value 0.00495
scoring_system epss
scoring_elements 0.65806
published_at 2026-04-12T12:55:00Z
6
value 0.00495
scoring_system epss
scoring_elements 0.65776
published_at 2026-04-13T12:55:00Z
7
value 0.00495
scoring_system epss
scoring_elements 0.6581
published_at 2026-04-21T12:55:00Z
8
value 0.00495
scoring_system epss
scoring_elements 0.65741
published_at 2026-04-02T12:55:00Z
9
value 0.00495
scoring_system epss
scoring_elements 0.65771
published_at 2026-04-04T12:55:00Z
10
value 0.00495
scoring_system epss
scoring_elements 0.65736
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7799
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1372509
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1372509
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:N
1
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
5
reference_url http://www.securityfocus.com/bid/100377
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100377
6
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479214
reference_id 1479214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479214
8
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
9
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7799
reference_id CVE-2017-7799
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7799
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
13
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7799
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f7ut-fqny-tffr
11
url VCID-gf3v-rmys-syex
vulnerability_id VCID-gf3v-rmys-syex
summary Response header name interning does not have same-origin protections and these headers are stored in a global registry. This allows stored header names to be available cross-origin.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7797.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7797.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7797
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31385
published_at 2026-04-01T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31375
published_at 2026-04-21T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31466
published_at 2026-04-09T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31469
published_at 2026-04-11T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31427
published_at 2026-04-12T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.3139
published_at 2026-04-13T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31423
published_at 2026-04-16T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31403
published_at 2026-04-18T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31522
published_at 2026-04-02T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31565
published_at 2026-04-04T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31382
published_at 2026-04-07T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31435
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7797
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1334776
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1334776
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:N/A:N
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
5
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479212
reference_id 1479212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479212
7
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
8
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7797
reference_id CVE-2017-7797
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7797
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
12
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7797
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gf3v-rmys-syex
12
url VCID-hd7u-f91y-dqhz
vulnerability_id VCID-hd7u-f91y-dqhz
summary An error occurs in the elliptic curve point addition algorithm that uses mixed Jacobian-affine coordinates where it can yield a result POINT_AT_INFINITY when it should not. A man-in-the-middle attacker could use this to interfere with a connection, resulting in an attacked party computing an incorrect shared secret.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7781.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7781
reference_id
reference_type
scores
0
value 0.00911
scoring_system epss
scoring_elements 0.75763
published_at 2026-04-01T12:55:00Z
1
value 0.00911
scoring_system epss
scoring_elements 0.75847
published_at 2026-04-21T12:55:00Z
2
value 0.00911
scoring_system epss
scoring_elements 0.75822
published_at 2026-04-09T12:55:00Z
3
value 0.00911
scoring_system epss
scoring_elements 0.75846
published_at 2026-04-11T12:55:00Z
4
value 0.00911
scoring_system epss
scoring_elements 0.75827
published_at 2026-04-12T12:55:00Z
5
value 0.00911
scoring_system epss
scoring_elements 0.75821
published_at 2026-04-13T12:55:00Z
6
value 0.00911
scoring_system epss
scoring_elements 0.75859
published_at 2026-04-16T12:55:00Z
7
value 0.00911
scoring_system epss
scoring_elements 0.75862
published_at 2026-04-18T12:55:00Z
8
value 0.00911
scoring_system epss
scoring_elements 0.75766
published_at 2026-04-02T12:55:00Z
9
value 0.00911
scoring_system epss
scoring_elements 0.75799
published_at 2026-04-04T12:55:00Z
10
value 0.00911
scoring_system epss
scoring_elements 0.75778
published_at 2026-04-07T12:55:00Z
11
value 0.00911
scoring_system epss
scoring_elements 0.75811
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7781
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1352039
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1352039
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
5
reference_url http://www.securityfocus.com/bid/100383
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100383
6
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479197
reference_id 1479197
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479197
8
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
9
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7781
reference_id CVE-2017-7781
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7781
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
13
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7781
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hd7u-f91y-dqhz
13
url VCID-hk7b-ckyd-7qg2
vulnerability_id VCID-hk7b-ckyd-7qg2
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7803.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7803.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7803
reference_id
reference_type
scores
0
value 0.01098
scoring_system epss
scoring_elements 0.78045
published_at 2026-04-21T12:55:00Z
1
value 0.01098
scoring_system epss
scoring_elements 0.77996
published_at 2026-04-04T12:55:00Z
2
value 0.01098
scoring_system epss
scoring_elements 0.77978
published_at 2026-04-07T12:55:00Z
3
value 0.01098
scoring_system epss
scoring_elements 0.78005
published_at 2026-04-08T12:55:00Z
4
value 0.01098
scoring_system epss
scoring_elements 0.78009
published_at 2026-04-09T12:55:00Z
5
value 0.01098
scoring_system epss
scoring_elements 0.78036
published_at 2026-04-11T12:55:00Z
6
value 0.01098
scoring_system epss
scoring_elements 0.78019
published_at 2026-04-12T12:55:00Z
7
value 0.01098
scoring_system epss
scoring_elements 0.78017
published_at 2026-04-13T12:55:00Z
8
value 0.01098
scoring_system epss
scoring_elements 0.78052
published_at 2026-04-16T12:55:00Z
9
value 0.01098
scoring_system epss
scoring_elements 0.78051
published_at 2026-04-18T12:55:00Z
10
value 0.01098
scoring_system epss
scoring_elements 0.77961
published_at 2026-04-01T12:55:00Z
11
value 0.01098
scoring_system epss
scoring_elements 0.77968
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7803
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1377426
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1377426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100234
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100234
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479225
reference_id 1479225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479225
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7803
reference_id CVE-2017-7803
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7803
45
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
46
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
47
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
48
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
49
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
50
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
51
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
52
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
53
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7803
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hk7b-ckyd-7qg2
14
url VCID-hw2h-w5r2-7qhv
vulnerability_id VCID-hw2h-w5r2-7qhv
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7753.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7753.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7753
reference_id
reference_type
scores
0
value 0.01721
scoring_system epss
scoring_elements 0.82441
published_at 2026-04-21T12:55:00Z
1
value 0.01721
scoring_system epss
scoring_elements 0.82361
published_at 2026-04-04T12:55:00Z
2
value 0.01721
scoring_system epss
scoring_elements 0.82356
published_at 2026-04-07T12:55:00Z
3
value 0.01721
scoring_system epss
scoring_elements 0.82384
published_at 2026-04-08T12:55:00Z
4
value 0.01721
scoring_system epss
scoring_elements 0.82391
published_at 2026-04-09T12:55:00Z
5
value 0.01721
scoring_system epss
scoring_elements 0.8241
published_at 2026-04-11T12:55:00Z
6
value 0.01721
scoring_system epss
scoring_elements 0.82407
published_at 2026-04-12T12:55:00Z
7
value 0.01721
scoring_system epss
scoring_elements 0.82401
published_at 2026-04-13T12:55:00Z
8
value 0.01721
scoring_system epss
scoring_elements 0.82436
published_at 2026-04-16T12:55:00Z
9
value 0.01721
scoring_system epss
scoring_elements 0.82437
published_at 2026-04-18T12:55:00Z
10
value 0.01721
scoring_system epss
scoring_elements 0.82329
published_at 2026-04-01T12:55:00Z
11
value 0.01721
scoring_system epss
scoring_elements 0.82343
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7753
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1353312
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1353312
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:C
1
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100315
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100315
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479188
reference_id 1479188
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479188
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7753
reference_id CVE-2017-7753
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7753
49
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
50
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
51
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
54
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
55
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
56
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
57
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7753
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hw2h-w5r2-7qhv
15
url VCID-kn3f-cx36-17h2
vulnerability_id VCID-kn3f-cx36-17h2
summary When an iframe has a sandbox attribute and its content is specified using srcdoc, that content does not inherit the containing page's Content Security Policy (CSP) as it should unless the sandbox attribute included allow-same-origin.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7788.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7788.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7788
reference_id
reference_type
scores
0
value 0.01918
scoring_system epss
scoring_elements 0.8326
published_at 2026-04-01T12:55:00Z
1
value 0.01918
scoring_system epss
scoring_elements 0.83366
published_at 2026-04-21T12:55:00Z
2
value 0.01918
scoring_system epss
scoring_elements 0.83323
published_at 2026-04-09T12:55:00Z
3
value 0.01918
scoring_system epss
scoring_elements 0.83338
published_at 2026-04-11T12:55:00Z
4
value 0.01918
scoring_system epss
scoring_elements 0.83332
published_at 2026-04-12T12:55:00Z
5
value 0.01918
scoring_system epss
scoring_elements 0.83328
published_at 2026-04-13T12:55:00Z
6
value 0.01918
scoring_system epss
scoring_elements 0.83363
published_at 2026-04-16T12:55:00Z
7
value 0.01918
scoring_system epss
scoring_elements 0.83365
published_at 2026-04-18T12:55:00Z
8
value 0.01918
scoring_system epss
scoring_elements 0.83276
published_at 2026-04-02T12:55:00Z
9
value 0.01918
scoring_system epss
scoring_elements 0.83291
published_at 2026-04-04T12:55:00Z
10
value 0.01918
scoring_system epss
scoring_elements 0.8329
published_at 2026-04-07T12:55:00Z
11
value 0.01918
scoring_system epss
scoring_elements 0.83314
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7788
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1073952
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1073952
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
5
reference_url http://www.securityfocus.com/bid/100379
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100379
6
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479207
reference_id 1479207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479207
8
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
9
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7788
reference_id CVE-2017-7788
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7788
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
13
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7788
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kn3f-cx36-17h2
16
url VCID-nmws-nx6k-5qbe
vulnerability_id VCID-nmws-nx6k-5qbe
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7798.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7798
reference_id
reference_type
scores
0
value 0.03574
scoring_system epss
scoring_elements 0.87746
published_at 2026-04-21T12:55:00Z
1
value 0.03574
scoring_system epss
scoring_elements 0.87725
published_at 2026-04-08T12:55:00Z
2
value 0.03574
scoring_system epss
scoring_elements 0.87731
published_at 2026-04-09T12:55:00Z
3
value 0.03574
scoring_system epss
scoring_elements 0.87742
published_at 2026-04-11T12:55:00Z
4
value 0.03574
scoring_system epss
scoring_elements 0.87736
published_at 2026-04-12T12:55:00Z
5
value 0.03574
scoring_system epss
scoring_elements 0.87734
published_at 2026-04-13T12:55:00Z
6
value 0.03574
scoring_system epss
scoring_elements 0.87748
published_at 2026-04-16T12:55:00Z
7
value 0.03574
scoring_system epss
scoring_elements 0.87747
published_at 2026-04-18T12:55:00Z
8
value 0.03574
scoring_system epss
scoring_elements 0.87679
published_at 2026-04-01T12:55:00Z
9
value 0.03574
scoring_system epss
scoring_elements 0.8769
published_at 2026-04-02T12:55:00Z
10
value 0.03574
scoring_system epss
scoring_elements 0.87702
published_at 2026-04-04T12:55:00Z
11
value 0.03574
scoring_system epss
scoring_elements 0.87704
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7798
2
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1371586%2C1372112
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1371586%2C1372112
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
22
reference_url http://www.securityfocus.com/bid/100198
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100198
23
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479213
reference_id 1479213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479213
25
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
26
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7798
reference_id CVE-2017-7798
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7798
44
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
45
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
46
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
47
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
48
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7798
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nmws-nx6k-5qbe
17
url VCID-np75-dzzq-8yef
vulnerability_id VCID-np75-dzzq-8yef
summary If a long user name is used in a username/password combination in a site URL (such as http://UserName:Password@example.com), the resulting modal prompt will hang in a non-responsive state or crash, causing a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7783.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7783.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7783
reference_id
reference_type
scores
0
value 0.06903
scoring_system epss
scoring_elements 0.91343
published_at 2026-04-01T12:55:00Z
1
value 0.06903
scoring_system epss
scoring_elements 0.91417
published_at 2026-04-21T12:55:00Z
2
value 0.06903
scoring_system epss
scoring_elements 0.91385
published_at 2026-04-09T12:55:00Z
3
value 0.06903
scoring_system epss
scoring_elements 0.91392
published_at 2026-04-11T12:55:00Z
4
value 0.06903
scoring_system epss
scoring_elements 0.91395
published_at 2026-04-12T12:55:00Z
5
value 0.06903
scoring_system epss
scoring_elements 0.91394
published_at 2026-04-13T12:55:00Z
6
value 0.06903
scoring_system epss
scoring_elements 0.91419
published_at 2026-04-16T12:55:00Z
7
value 0.06903
scoring_system epss
scoring_elements 0.91415
published_at 2026-04-18T12:55:00Z
8
value 0.06903
scoring_system epss
scoring_elements 0.91349
published_at 2026-04-02T12:55:00Z
9
value 0.06903
scoring_system epss
scoring_elements 0.91359
published_at 2026-04-04T12:55:00Z
10
value 0.06903
scoring_system epss
scoring_elements 0.91367
published_at 2026-04-07T12:55:00Z
11
value 0.06903
scoring_system epss
scoring_elements 0.91379
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7783
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1360842
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1360842
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.exploit-db.com/exploits/43020/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/43020/
5
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
6
reference_url http://www.securityfocus.com/bid/100401
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100401
7
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479176
reference_id 1479176
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479176
9
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
10
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/43020.txt
reference_id CVE-2017-7783
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/43020.txt
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7783
reference_id CVE-2017-7783
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7783
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
15
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7783
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-np75-dzzq-8yef
18
url VCID-q7jk-b69d-bbav
vulnerability_id VCID-q7jk-b69d-bbav
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7785.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7785.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7785
reference_id
reference_type
scores
0
value 0.08433
scoring_system epss
scoring_elements 0.92352
published_at 2026-04-21T12:55:00Z
1
value 0.08433
scoring_system epss
scoring_elements 0.92353
published_at 2026-04-16T12:55:00Z
2
value 0.08433
scoring_system epss
scoring_elements 0.92306
published_at 2026-04-01T12:55:00Z
3
value 0.08433
scoring_system epss
scoring_elements 0.92342
published_at 2026-04-13T12:55:00Z
4
value 0.08433
scoring_system epss
scoring_elements 0.92344
published_at 2026-04-12T12:55:00Z
5
value 0.08433
scoring_system epss
scoring_elements 0.92343
published_at 2026-04-11T12:55:00Z
6
value 0.08433
scoring_system epss
scoring_elements 0.92338
published_at 2026-04-09T12:55:00Z
7
value 0.08433
scoring_system epss
scoring_elements 0.92319
published_at 2026-04-04T12:55:00Z
8
value 0.08433
scoring_system epss
scoring_elements 0.92322
published_at 2026-04-07T12:55:00Z
9
value 0.08433
scoring_system epss
scoring_elements 0.92333
published_at 2026-04-08T12:55:00Z
10
value 0.08433
scoring_system epss
scoring_elements 0.92313
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7785
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1356985
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1356985
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100206
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100206
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479203
reference_id 1479203
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479203
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7785
reference_id CVE-2017-7785
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7785
53
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
54
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
58
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
59
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
60
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
61
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7785
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q7jk-b69d-bbav
19
url VCID-qetw-2ah7-5ba4
vulnerability_id VCID-qetw-2ah7-5ba4
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7809.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7809
reference_id
reference_type
scores
0
value 0.02292
scoring_system epss
scoring_elements 0.84738
published_at 2026-04-21T12:55:00Z
1
value 0.02292
scoring_system epss
scoring_elements 0.84676
published_at 2026-04-04T12:55:00Z
2
value 0.02292
scoring_system epss
scoring_elements 0.84678
published_at 2026-04-07T12:55:00Z
3
value 0.02292
scoring_system epss
scoring_elements 0.847
published_at 2026-04-08T12:55:00Z
4
value 0.02292
scoring_system epss
scoring_elements 0.84707
published_at 2026-04-09T12:55:00Z
5
value 0.02292
scoring_system epss
scoring_elements 0.84725
published_at 2026-04-11T12:55:00Z
6
value 0.02292
scoring_system epss
scoring_elements 0.8472
published_at 2026-04-12T12:55:00Z
7
value 0.02292
scoring_system epss
scoring_elements 0.84714
published_at 2026-04-13T12:55:00Z
8
value 0.02292
scoring_system epss
scoring_elements 0.84736
published_at 2026-04-16T12:55:00Z
9
value 0.02292
scoring_system epss
scoring_elements 0.84737
published_at 2026-04-18T12:55:00Z
10
value 0.02292
scoring_system epss
scoring_elements 0.84641
published_at 2026-04-01T12:55:00Z
11
value 0.02292
scoring_system epss
scoring_elements 0.84656
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7809
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1380284
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1380284
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100203
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100203
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479650
reference_id 1479650
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479650
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7809
reference_id CVE-2017-7809
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7809
49
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
50
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
51
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
54
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
55
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
56
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
57
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7809
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qetw-2ah7-5ba4
20
url VCID-qh1k-c7ct-efg8
vulnerability_id VCID-qh1k-c7ct-efg8
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7786.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7786.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7786
reference_id
reference_type
scores
0
value 0.0852
scoring_system epss
scoring_elements 0.92394
published_at 2026-04-21T12:55:00Z
1
value 0.0852
scoring_system epss
scoring_elements 0.92393
published_at 2026-04-18T12:55:00Z
2
value 0.0852
scoring_system epss
scoring_elements 0.92342
published_at 2026-04-01T12:55:00Z
3
value 0.0852
scoring_system epss
scoring_elements 0.92383
published_at 2026-04-12T12:55:00Z
4
value 0.0852
scoring_system epss
scoring_elements 0.92381
published_at 2026-04-13T12:55:00Z
5
value 0.0852
scoring_system epss
scoring_elements 0.92375
published_at 2026-04-09T12:55:00Z
6
value 0.0852
scoring_system epss
scoring_elements 0.92371
published_at 2026-04-08T12:55:00Z
7
value 0.0852
scoring_system epss
scoring_elements 0.92349
published_at 2026-04-02T12:55:00Z
8
value 0.0852
scoring_system epss
scoring_elements 0.92355
published_at 2026-04-04T12:55:00Z
9
value 0.0852
scoring_system epss
scoring_elements 0.92359
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7786
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1365189
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1365189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100206
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100206
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479205
reference_id 1479205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479205
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7786
reference_id CVE-2017-7786
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7786
54
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
55
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
58
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
59
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
60
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
61
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
62
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7786
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qh1k-c7ct-efg8
21
url VCID-s558-4jac-47ft
vulnerability_id VCID-s558-4jac-47ft
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7791.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7791.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7791
reference_id
reference_type
scores
0
value 0.01355
scoring_system epss
scoring_elements 0.80151
published_at 2026-04-21T12:55:00Z
1
value 0.01355
scoring_system epss
scoring_elements 0.801
published_at 2026-04-04T12:55:00Z
2
value 0.01355
scoring_system epss
scoring_elements 0.80088
published_at 2026-04-07T12:55:00Z
3
value 0.01355
scoring_system epss
scoring_elements 0.80116
published_at 2026-04-08T12:55:00Z
4
value 0.01355
scoring_system epss
scoring_elements 0.80123
published_at 2026-04-09T12:55:00Z
5
value 0.01355
scoring_system epss
scoring_elements 0.80142
published_at 2026-04-11T12:55:00Z
6
value 0.01355
scoring_system epss
scoring_elements 0.80126
published_at 2026-04-12T12:55:00Z
7
value 0.01355
scoring_system epss
scoring_elements 0.80118
published_at 2026-04-13T12:55:00Z
8
value 0.01355
scoring_system epss
scoring_elements 0.80147
published_at 2026-04-16T12:55:00Z
9
value 0.01355
scoring_system epss
scoring_elements 0.80148
published_at 2026-04-18T12:55:00Z
10
value 0.01355
scoring_system epss
scoring_elements 0.80072
published_at 2026-04-01T12:55:00Z
11
value 0.01355
scoring_system epss
scoring_elements 0.80079
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7791
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1365875
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1365875
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:N
1
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100240
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100240
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479209
reference_id 1479209
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479209
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7791
reference_id CVE-2017-7791
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7791
53
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
54
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
58
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
59
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
60
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
61
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7791
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s558-4jac-47ft
22
url VCID-vgwu-jbjv-xyd1
vulnerability_id VCID-vgwu-jbjv-xyd1
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7802.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7802
reference_id
reference_type
scores
0
value 0.02292
scoring_system epss
scoring_elements 0.84738
published_at 2026-04-21T12:55:00Z
1
value 0.02292
scoring_system epss
scoring_elements 0.84676
published_at 2026-04-04T12:55:00Z
2
value 0.02292
scoring_system epss
scoring_elements 0.84678
published_at 2026-04-07T12:55:00Z
3
value 0.02292
scoring_system epss
scoring_elements 0.847
published_at 2026-04-08T12:55:00Z
4
value 0.02292
scoring_system epss
scoring_elements 0.84707
published_at 2026-04-09T12:55:00Z
5
value 0.02292
scoring_system epss
scoring_elements 0.84725
published_at 2026-04-11T12:55:00Z
6
value 0.02292
scoring_system epss
scoring_elements 0.8472
published_at 2026-04-12T12:55:00Z
7
value 0.02292
scoring_system epss
scoring_elements 0.84714
published_at 2026-04-13T12:55:00Z
8
value 0.02292
scoring_system epss
scoring_elements 0.84736
published_at 2026-04-16T12:55:00Z
9
value 0.02292
scoring_system epss
scoring_elements 0.84737
published_at 2026-04-18T12:55:00Z
10
value 0.02292
scoring_system epss
scoring_elements 0.84641
published_at 2026-04-01T12:55:00Z
11
value 0.02292
scoring_system epss
scoring_elements 0.84656
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7802
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1378147
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1378147
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100202
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100202
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479224
reference_id 1479224
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479224
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7802
reference_id CVE-2017-7802
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7802
49
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
50
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
51
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
54
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
55
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
56
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
57
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7802
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vgwu-jbjv-xyd1
23
url VCID-xzxb-5pq8-9bfd
vulnerability_id VCID-xzxb-5pq8-9bfd
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7801.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7801.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7801
reference_id
reference_type
scores
0
value 0.02318
scoring_system epss
scoring_elements 0.84812
published_at 2026-04-21T12:55:00Z
1
value 0.02318
scoring_system epss
scoring_elements 0.84752
published_at 2026-04-04T12:55:00Z
2
value 0.02318
scoring_system epss
scoring_elements 0.84755
published_at 2026-04-07T12:55:00Z
3
value 0.02318
scoring_system epss
scoring_elements 0.84777
published_at 2026-04-08T12:55:00Z
4
value 0.02318
scoring_system epss
scoring_elements 0.84784
published_at 2026-04-09T12:55:00Z
5
value 0.02318
scoring_system epss
scoring_elements 0.84802
published_at 2026-04-11T12:55:00Z
6
value 0.02318
scoring_system epss
scoring_elements 0.84798
published_at 2026-04-12T12:55:00Z
7
value 0.02318
scoring_system epss
scoring_elements 0.84793
published_at 2026-04-13T12:55:00Z
8
value 0.02318
scoring_system epss
scoring_elements 0.84814
published_at 2026-04-16T12:55:00Z
9
value 0.02318
scoring_system epss
scoring_elements 0.84815
published_at 2026-04-18T12:55:00Z
10
value 0.02318
scoring_system epss
scoring_elements 0.84718
published_at 2026-04-01T12:55:00Z
11
value 0.02318
scoring_system epss
scoring_elements 0.84733
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7801
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1371259
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1371259
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100197
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100197
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479223
reference_id 1479223
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479223
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7801
reference_id CVE-2017-7801
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7801
49
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
50
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
51
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
54
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
55
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
56
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
57
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7801
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzxb-5pq8-9bfd
24
url VCID-yk2z-f6vu-93fb
vulnerability_id VCID-yk2z-f6vu-93fb
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7800.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7800
reference_id
reference_type
scores
0
value 0.04285
scoring_system epss
scoring_elements 0.88862
published_at 2026-04-21T12:55:00Z
1
value 0.04285
scoring_system epss
scoring_elements 0.88865
published_at 2026-04-18T12:55:00Z
2
value 0.04285
scoring_system epss
scoring_elements 0.88797
published_at 2026-04-01T12:55:00Z
3
value 0.04285
scoring_system epss
scoring_elements 0.88867
published_at 2026-04-16T12:55:00Z
4
value 0.04285
scoring_system epss
scoring_elements 0.88853
published_at 2026-04-13T12:55:00Z
5
value 0.04285
scoring_system epss
scoring_elements 0.88858
published_at 2026-04-11T12:55:00Z
6
value 0.04285
scoring_system epss
scoring_elements 0.88846
published_at 2026-04-09T12:55:00Z
7
value 0.04285
scoring_system epss
scoring_elements 0.88821
published_at 2026-04-04T12:55:00Z
8
value 0.04285
scoring_system epss
scoring_elements 0.88824
published_at 2026-04-07T12:55:00Z
9
value 0.04285
scoring_system epss
scoring_elements 0.88841
published_at 2026-04-08T12:55:00Z
10
value 0.04285
scoring_system epss
scoring_elements 0.88805
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7800
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1374047
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1374047
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://www.debian.org/security/2017/dsa-3928
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3928
20
reference_url https://www.debian.org/security/2017/dsa-3968
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3968
21
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
22
reference_url https://www.mozilla.org/security/advisories/mfsa2017-19/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-19/
23
reference_url https://www.mozilla.org/security/advisories/mfsa2017-20/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-20/
24
reference_url http://www.securityfocus.com/bid/100196
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100196
25
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479218
reference_id 1479218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479218
27
reference_url https://security.archlinux.org/ASA-201708-18
reference_id ASA-201708-18
reference_type
scores
url https://security.archlinux.org/ASA-201708-18
28
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
29
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
30
reference_url https://security.archlinux.org/AVG-385
reference_id AVG-385
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-385
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7800
reference_id CVE-2017-7800
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7800
49
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
50
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
51
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
reference_id mfsa2017-19
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-19
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
reference_id mfsa2017-20
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-20
54
reference_url https://access.redhat.com/errata/RHSA-2017:2456
reference_id RHSA-2017:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2456
55
reference_url https://access.redhat.com/errata/RHSA-2017:2534
reference_id RHSA-2017:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2534
56
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
57
reference_url https://usn.ubuntu.com/3416-1/
reference_id USN-3416-1
reference_type
scores
url https://usn.ubuntu.com/3416-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
aliases CVE-2017-7800
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yk2z-f6vu-93fb
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0.1-1