Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/firefox@54.0-1
Typealpm
Namespacearchlinux
Namefirefox
Version54.0-1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version55.0-1
Latest_non_vulnerable_version101.0-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4jqv-p541-tfa9
vulnerability_id VCID-4jqv-p541-tfa9
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7749.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7749.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7749
reference_id
reference_type
scores
0
value 0.01874
scoring_system epss
scoring_elements 0.83158
published_at 2026-04-21T12:55:00Z
1
value 0.01874
scoring_system epss
scoring_elements 0.83081
published_at 2026-04-04T12:55:00Z
2
value 0.01874
scoring_system epss
scoring_elements 0.83079
published_at 2026-04-07T12:55:00Z
3
value 0.01874
scoring_system epss
scoring_elements 0.83103
published_at 2026-04-08T12:55:00Z
4
value 0.01874
scoring_system epss
scoring_elements 0.83111
published_at 2026-04-09T12:55:00Z
5
value 0.01874
scoring_system epss
scoring_elements 0.83127
published_at 2026-04-11T12:55:00Z
6
value 0.01874
scoring_system epss
scoring_elements 0.83121
published_at 2026-04-12T12:55:00Z
7
value 0.01874
scoring_system epss
scoring_elements 0.83117
published_at 2026-04-13T12:55:00Z
8
value 0.01874
scoring_system epss
scoring_elements 0.83154
published_at 2026-04-16T12:55:00Z
9
value 0.01874
scoring_system epss
scoring_elements 0.83155
published_at 2026-04-18T12:55:00Z
10
value 0.01874
scoring_system epss
scoring_elements 0.83051
published_at 2026-04-01T12:55:00Z
11
value 0.01874
scoring_system epss
scoring_elements 0.83067
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7749
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1355039
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1355039
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://www.debian.org/security/2017/dsa-3881
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3881
23
reference_url https://www.debian.org/security/2017/dsa-3918
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3918
24
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
25
reference_url https://www.mozilla.org/security/advisories/mfsa2017-16/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-16/
26
reference_url https://www.mozilla.org/security/advisories/mfsa2017-17/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-17/
27
reference_url http://www.securityfocus.com/bid/99057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99057
28
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461253
reference_id 1461253
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461253
30
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
31
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
32
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
33
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7749
reference_id CVE-2017-7749
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7749
52
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
reference_id mfsa2017-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
reference_id mfsa2017-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
56
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
57
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
58
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
59
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7749
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jqv-p541-tfa9
1
url VCID-56jb-xrj9-dyf3
vulnerability_id VCID-56jb-xrj9-dyf3
summary Mozilla developers and community members Mats Palmgren, Philipp, Byron Campen, Christian Holler, Gary Kwong, Benjamin Bouvier, Bob Clary, Jon Coppeard, and Michael Layzell reported memory safety bugs present in Firefox 53. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5471
reference_id
reference_type
scores
0
value 0.00564
scoring_system epss
scoring_elements 0.6842
published_at 2026-04-21T12:55:00Z
1
value 0.00564
scoring_system epss
scoring_elements 0.68325
published_at 2026-04-01T12:55:00Z
2
value 0.00564
scoring_system epss
scoring_elements 0.68424
published_at 2026-04-12T12:55:00Z
3
value 0.00564
scoring_system epss
scoring_elements 0.68391
published_at 2026-04-13T12:55:00Z
4
value 0.00564
scoring_system epss
scoring_elements 0.68428
published_at 2026-04-16T12:55:00Z
5
value 0.00564
scoring_system epss
scoring_elements 0.68442
published_at 2026-04-18T12:55:00Z
6
value 0.00564
scoring_system epss
scoring_elements 0.68345
published_at 2026-04-02T12:55:00Z
7
value 0.00564
scoring_system epss
scoring_elements 0.68364
published_at 2026-04-04T12:55:00Z
8
value 0.00564
scoring_system epss
scoring_elements 0.68341
published_at 2026-04-07T12:55:00Z
9
value 0.00564
scoring_system epss
scoring_elements 0.68392
published_at 2026-04-08T12:55:00Z
10
value 0.00564
scoring_system epss
scoring_elements 0.68409
published_at 2026-04-09T12:55:00Z
11
value 0.00564
scoring_system epss
scoring_elements 0.68436
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5471
1
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1349604%2C1318645%2C1361098%2C1361100%2C1341026%2C1349421%2C1360852%2C1299147%2C1352073%2C1354853%2C1366446%2C1342181%2C1343069
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1349604%2C1318645%2C1361098%2C1361100%2C1341026%2C1349421%2C1360852%2C1299147%2C1352073%2C1354853%2C1366446%2C1342181%2C1343069
2
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
3
reference_url http://www.securityfocus.com/bid/99042
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99042
4
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
5
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
6
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5471
reference_id CVE-2017-5471
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5471
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
10
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-5471
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-56jb-xrj9-dyf3
2
url VCID-622g-5uav-bbgd
vulnerability_id VCID-622g-5uav-bbgd
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7764.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7764.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7764
reference_id
reference_type
scores
0
value 0.01035
scoring_system epss
scoring_elements 0.77406
published_at 2026-04-21T12:55:00Z
1
value 0.01035
scoring_system epss
scoring_elements 0.77352
published_at 2026-04-04T12:55:00Z
2
value 0.01035
scoring_system epss
scoring_elements 0.77332
published_at 2026-04-07T12:55:00Z
3
value 0.01035
scoring_system epss
scoring_elements 0.77362
published_at 2026-04-08T12:55:00Z
4
value 0.01035
scoring_system epss
scoring_elements 0.77372
published_at 2026-04-09T12:55:00Z
5
value 0.01035
scoring_system epss
scoring_elements 0.77399
published_at 2026-04-11T12:55:00Z
6
value 0.01035
scoring_system epss
scoring_elements 0.77378
published_at 2026-04-12T12:55:00Z
7
value 0.01035
scoring_system epss
scoring_elements 0.77375
published_at 2026-04-13T12:55:00Z
8
value 0.01035
scoring_system epss
scoring_elements 0.77415
published_at 2026-04-16T12:55:00Z
9
value 0.01035
scoring_system epss
scoring_elements 0.77414
published_at 2026-04-18T12:55:00Z
10
value 0.01035
scoring_system epss
scoring_elements 0.77317
published_at 2026-04-01T12:55:00Z
11
value 0.01035
scoring_system epss
scoring_elements 0.77323
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7764
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1364283
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1364283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:P
1
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://www.debian.org/security/2017/dsa-3881
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3881
23
reference_url https://www.debian.org/security/2017/dsa-3918
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3918
24
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
25
reference_url https://www.mozilla.org/security/advisories/mfsa2017-16/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-16/
26
reference_url https://www.mozilla.org/security/advisories/mfsa2017-17/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-17/
27
reference_url http://www.securityfocus.com/bid/99057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99057
28
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
29
reference_url http://www.unicode.org/reports/tr31/tr31-26.html#Aspirational_Use_Scripts
reference_id
reference_type
scores
url http://www.unicode.org/reports/tr31/tr31-26.html#Aspirational_Use_Scripts
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461262
reference_id 1461262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461262
31
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
32
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
33
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
34
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7764
reference_id CVE-2017-7764
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7764
40
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
reference_id mfsa2017-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
43
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
reference_id mfsa2017-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
44
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
45
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
46
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
47
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7764
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-622g-5uav-bbgd
3
url VCID-6pdh-nn19-8yc5
vulnerability_id VCID-6pdh-nn19-8yc5
summary
Multiple vulnerabilities have been found in Graphite, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7775.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7775.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472221
reference_id 1472221
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472221
3
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
4
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
5
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
6
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7775
reference_id CVE-2017-7775
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2017-7775
8
reference_url https://security.gentoo.org/glsa/201710-13
reference_id GLSA-201710-13
reference_type
scores
url https://security.gentoo.org/glsa/201710-13
9
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
10
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
11
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
12
reference_url https://access.redhat.com/errata/RHSA-2017:1793
reference_id RHSA-2017:1793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1793
13
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
14
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
15
reference_url https://usn.ubuntu.com/3398-1/
reference_id USN-3398-1
reference_type
scores
url https://usn.ubuntu.com/3398-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7775
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6pdh-nn19-8yc5
4
url VCID-9k9g-4cxt-3faj
vulnerability_id VCID-9k9g-4cxt-3faj
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7754.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7754.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7754
reference_id
reference_type
scores
0
value 0.01409
scoring_system epss
scoring_elements 0.80525
published_at 2026-04-21T12:55:00Z
1
value 0.01409
scoring_system epss
scoring_elements 0.80467
published_at 2026-04-04T12:55:00Z
2
value 0.01409
scoring_system epss
scoring_elements 0.80457
published_at 2026-04-07T12:55:00Z
3
value 0.01409
scoring_system epss
scoring_elements 0.80486
published_at 2026-04-08T12:55:00Z
4
value 0.01409
scoring_system epss
scoring_elements 0.80496
published_at 2026-04-09T12:55:00Z
5
value 0.01409
scoring_system epss
scoring_elements 0.80514
published_at 2026-04-11T12:55:00Z
6
value 0.01409
scoring_system epss
scoring_elements 0.805
published_at 2026-04-12T12:55:00Z
7
value 0.01409
scoring_system epss
scoring_elements 0.80492
published_at 2026-04-13T12:55:00Z
8
value 0.01409
scoring_system epss
scoring_elements 0.80521
published_at 2026-04-16T12:55:00Z
9
value 0.01409
scoring_system epss
scoring_elements 0.80522
published_at 2026-04-18T12:55:00Z
10
value 0.01409
scoring_system epss
scoring_elements 0.8044
published_at 2026-04-01T12:55:00Z
11
value 0.01409
scoring_system epss
scoring_elements 0.80446
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7754
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1357090
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1357090
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://www.debian.org/security/2017/dsa-3881
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3881
23
reference_url https://www.debian.org/security/2017/dsa-3918
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3918
24
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
25
reference_url https://www.mozilla.org/security/advisories/mfsa2017-16/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-16/
26
reference_url https://www.mozilla.org/security/advisories/mfsa2017-17/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-17/
27
reference_url http://www.securityfocus.com/bid/99057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99057
28
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461257
reference_id 1461257
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461257
30
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
31
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
32
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
33
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7754
reference_id CVE-2017-7754
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7754
52
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
reference_id mfsa2017-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
reference_id mfsa2017-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
56
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
57
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
58
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
59
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7754
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9k9g-4cxt-3faj
5
url VCID-awue-n9ua-hfej
vulnerability_id VCID-awue-n9ua-hfej
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7757.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7757.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7757
reference_id
reference_type
scores
0
value 0.01874
scoring_system epss
scoring_elements 0.83158
published_at 2026-04-21T12:55:00Z
1
value 0.01874
scoring_system epss
scoring_elements 0.83081
published_at 2026-04-04T12:55:00Z
2
value 0.01874
scoring_system epss
scoring_elements 0.83079
published_at 2026-04-07T12:55:00Z
3
value 0.01874
scoring_system epss
scoring_elements 0.83103
published_at 2026-04-08T12:55:00Z
4
value 0.01874
scoring_system epss
scoring_elements 0.83111
published_at 2026-04-09T12:55:00Z
5
value 0.01874
scoring_system epss
scoring_elements 0.83127
published_at 2026-04-11T12:55:00Z
6
value 0.01874
scoring_system epss
scoring_elements 0.83121
published_at 2026-04-12T12:55:00Z
7
value 0.01874
scoring_system epss
scoring_elements 0.83117
published_at 2026-04-13T12:55:00Z
8
value 0.01874
scoring_system epss
scoring_elements 0.83154
published_at 2026-04-16T12:55:00Z
9
value 0.01874
scoring_system epss
scoring_elements 0.83155
published_at 2026-04-18T12:55:00Z
10
value 0.01874
scoring_system epss
scoring_elements 0.83051
published_at 2026-04-01T12:55:00Z
11
value 0.01874
scoring_system epss
scoring_elements 0.83067
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7757
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1356824
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1356824
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://www.debian.org/security/2017/dsa-3881
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3881
23
reference_url https://www.debian.org/security/2017/dsa-3918
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3918
24
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
25
reference_url https://www.mozilla.org/security/advisories/mfsa2017-16/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-16/
26
reference_url https://www.mozilla.org/security/advisories/mfsa2017-17/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-17/
27
reference_url http://www.securityfocus.com/bid/99057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99057
28
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461259
reference_id 1461259
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461259
30
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
31
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
32
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
33
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7757
reference_id CVE-2017-7757
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7757
39
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
40
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
reference_id mfsa2017-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
reference_id mfsa2017-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
43
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
44
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
45
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
46
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7757
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-awue-n9ua-hfej
6
url VCID-f7zd-nx3e-tba1
vulnerability_id VCID-f7zd-nx3e-tba1
summary
Multiple vulnerabilities have been found in Graphite, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7771.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7771.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7771
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67465
published_at 2026-04-01T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.67569
published_at 2026-04-21T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.67566
published_at 2026-04-09T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.67588
published_at 2026-04-11T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.67575
published_at 2026-04-12T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67542
published_at 2026-04-13T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67577
published_at 2026-04-16T12:55:00Z
7
value 0.00538
scoring_system epss
scoring_elements 0.6759
published_at 2026-04-18T12:55:00Z
8
value 0.00538
scoring_system epss
scoring_elements 0.67501
published_at 2026-04-02T12:55:00Z
9
value 0.00538
scoring_system epss
scoring_elements 0.67522
published_at 2026-04-04T12:55:00Z
10
value 0.00538
scoring_system epss
scoring_elements 0.675
published_at 2026-04-07T12:55:00Z
11
value 0.00538
scoring_system epss
scoring_elements 0.67552
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7771
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472212
reference_id 1472212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472212
23
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
24
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
25
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
26
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7771
reference_id CVE-2017-7771
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7771
30
reference_url https://security.gentoo.org/glsa/201710-13
reference_id GLSA-201710-13
reference_type
scores
url https://security.gentoo.org/glsa/201710-13
31
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
32
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
33
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
34
reference_url https://access.redhat.com/errata/RHSA-2017:1793
reference_id RHSA-2017:1793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1793
35
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
36
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
37
reference_url https://usn.ubuntu.com/3398-1/
reference_id USN-3398-1
reference_type
scores
url https://usn.ubuntu.com/3398-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7771
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f7zd-nx3e-tba1
7
url VCID-h63e-ngr6-zqee
vulnerability_id VCID-h63e-ngr6-zqee
summary
Multiple vulnerabilities have been found in Graphite, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7772.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7772.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7772
reference_id
reference_type
scores
0
value 0.00618
scoring_system epss
scoring_elements 0.69885
published_at 2026-04-01T12:55:00Z
1
value 0.00618
scoring_system epss
scoring_elements 0.69983
published_at 2026-04-21T12:55:00Z
2
value 0.00618
scoring_system epss
scoring_elements 0.69953
published_at 2026-04-09T12:55:00Z
3
value 0.00618
scoring_system epss
scoring_elements 0.69976
published_at 2026-04-11T12:55:00Z
4
value 0.00618
scoring_system epss
scoring_elements 0.69961
published_at 2026-04-12T12:55:00Z
5
value 0.00618
scoring_system epss
scoring_elements 0.69947
published_at 2026-04-13T12:55:00Z
6
value 0.00618
scoring_system epss
scoring_elements 0.69991
published_at 2026-04-16T12:55:00Z
7
value 0.00618
scoring_system epss
scoring_elements 0.70001
published_at 2026-04-18T12:55:00Z
8
value 0.00618
scoring_system epss
scoring_elements 0.69897
published_at 2026-04-02T12:55:00Z
9
value 0.00618
scoring_system epss
scoring_elements 0.69911
published_at 2026-04-04T12:55:00Z
10
value 0.00618
scoring_system epss
scoring_elements 0.69888
published_at 2026-04-07T12:55:00Z
11
value 0.00618
scoring_system epss
scoring_elements 0.69936
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7772
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472213
reference_id 1472213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472213
23
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
24
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
25
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
26
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7772
reference_id CVE-2017-7772
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7772
30
reference_url https://security.gentoo.org/glsa/201710-13
reference_id GLSA-201710-13
reference_type
scores
url https://security.gentoo.org/glsa/201710-13
31
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
32
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
33
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
34
reference_url https://access.redhat.com/errata/RHSA-2017:1793
reference_id RHSA-2017:1793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1793
35
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
36
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
37
reference_url https://usn.ubuntu.com/3398-1/
reference_id USN-3398-1
reference_type
scores
url https://usn.ubuntu.com/3398-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7772
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h63e-ngr6-zqee
8
url VCID-j56s-gf2k-zqdx
vulnerability_id VCID-j56s-gf2k-zqdx
summary
Multiple vulnerabilities have been found in Graphite, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7774.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7774.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7774
reference_id
reference_type
scores
0
value 0.00562
scoring_system epss
scoring_elements 0.68255
published_at 2026-04-01T12:55:00Z
1
value 0.00562
scoring_system epss
scoring_elements 0.68373
published_at 2026-04-18T12:55:00Z
2
value 0.00562
scoring_system epss
scoring_elements 0.68323
published_at 2026-04-08T12:55:00Z
3
value 0.00562
scoring_system epss
scoring_elements 0.68339
published_at 2026-04-09T12:55:00Z
4
value 0.00562
scoring_system epss
scoring_elements 0.68365
published_at 2026-04-11T12:55:00Z
5
value 0.00562
scoring_system epss
scoring_elements 0.68352
published_at 2026-04-21T12:55:00Z
6
value 0.00562
scoring_system epss
scoring_elements 0.6832
published_at 2026-04-13T12:55:00Z
7
value 0.00562
scoring_system epss
scoring_elements 0.68359
published_at 2026-04-16T12:55:00Z
8
value 0.00562
scoring_system epss
scoring_elements 0.68275
published_at 2026-04-02T12:55:00Z
9
value 0.00562
scoring_system epss
scoring_elements 0.68295
published_at 2026-04-04T12:55:00Z
10
value 0.00562
scoring_system epss
scoring_elements 0.68272
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7774
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472219
reference_id 1472219
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472219
23
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
24
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
25
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
26
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7774
reference_id CVE-2017-7774
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7774
30
reference_url https://security.gentoo.org/glsa/201710-13
reference_id GLSA-201710-13
reference_type
scores
url https://security.gentoo.org/glsa/201710-13
31
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
32
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
33
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
34
reference_url https://access.redhat.com/errata/RHSA-2017:1793
reference_id RHSA-2017:1793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1793
35
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
36
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
37
reference_url https://usn.ubuntu.com/3398-1/
reference_id USN-3398-1
reference_type
scores
url https://usn.ubuntu.com/3398-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7774
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j56s-gf2k-zqdx
9
url VCID-jvkp-8vex-4yby
vulnerability_id VCID-jvkp-8vex-4yby
summary When entered directly, Reader Mode did not strip the username and password section of URLs displayed in the addressbar. This can be used for spoofing the domain of the current page.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7762.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7762.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7762
reference_id
reference_type
scores
0
value 0.0054
scoring_system epss
scoring_elements 0.67531
published_at 2026-04-01T12:55:00Z
1
value 0.0054
scoring_system epss
scoring_elements 0.67633
published_at 2026-04-21T12:55:00Z
2
value 0.0054
scoring_system epss
scoring_elements 0.67654
published_at 2026-04-18T12:55:00Z
3
value 0.0054
scoring_system epss
scoring_elements 0.6764
published_at 2026-04-12T12:55:00Z
4
value 0.0054
scoring_system epss
scoring_elements 0.67608
published_at 2026-04-13T12:55:00Z
5
value 0.0054
scoring_system epss
scoring_elements 0.67642
published_at 2026-04-16T12:55:00Z
6
value 0.0054
scoring_system epss
scoring_elements 0.67567
published_at 2026-04-07T12:55:00Z
7
value 0.0054
scoring_system epss
scoring_elements 0.67589
published_at 2026-04-04T12:55:00Z
8
value 0.0054
scoring_system epss
scoring_elements 0.67618
published_at 2026-04-08T12:55:00Z
9
value 0.0054
scoring_system epss
scoring_elements 0.67632
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7762
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1358248
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1358248
3
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
4
reference_url http://www.securityfocus.com/bid/99047
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99047
5
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1590493
reference_id 1590493
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1590493
7
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
8
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7762
reference_id CVE-2017-7762
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7762
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
18
reference_url https://access.redhat.com/errata/RHSA-2018:2112
reference_id RHSA-2018:2112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2112
19
reference_url https://access.redhat.com/errata/RHSA-2018:2113
reference_id RHSA-2018:2113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2113
20
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7762
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvkp-8vex-4yby
10
url VCID-jwnz-gnjs-1uaa
vulnerability_id VCID-jwnz-gnjs-1uaa
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7751.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7751.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7751
reference_id
reference_type
scores
0
value 0.01874
scoring_system epss
scoring_elements 0.83158
published_at 2026-04-21T12:55:00Z
1
value 0.01874
scoring_system epss
scoring_elements 0.83081
published_at 2026-04-04T12:55:00Z
2
value 0.01874
scoring_system epss
scoring_elements 0.83079
published_at 2026-04-07T12:55:00Z
3
value 0.01874
scoring_system epss
scoring_elements 0.83103
published_at 2026-04-08T12:55:00Z
4
value 0.01874
scoring_system epss
scoring_elements 0.83111
published_at 2026-04-09T12:55:00Z
5
value 0.01874
scoring_system epss
scoring_elements 0.83127
published_at 2026-04-11T12:55:00Z
6
value 0.01874
scoring_system epss
scoring_elements 0.83121
published_at 2026-04-12T12:55:00Z
7
value 0.01874
scoring_system epss
scoring_elements 0.83117
published_at 2026-04-13T12:55:00Z
8
value 0.01874
scoring_system epss
scoring_elements 0.83154
published_at 2026-04-16T12:55:00Z
9
value 0.01874
scoring_system epss
scoring_elements 0.83155
published_at 2026-04-18T12:55:00Z
10
value 0.01874
scoring_system epss
scoring_elements 0.83051
published_at 2026-04-01T12:55:00Z
11
value 0.01874
scoring_system epss
scoring_elements 0.83067
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7751
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1363396
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1363396
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://www.debian.org/security/2017/dsa-3881
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3881
23
reference_url https://www.debian.org/security/2017/dsa-3918
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3918
24
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
25
reference_url https://www.mozilla.org/security/advisories/mfsa2017-16/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-16/
26
reference_url https://www.mozilla.org/security/advisories/mfsa2017-17/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-17/
27
reference_url http://www.securityfocus.com/bid/99057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99057
28
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461255
reference_id 1461255
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461255
30
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
31
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
32
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
33
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7751
reference_id CVE-2017-7751
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7751
52
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
reference_id mfsa2017-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
reference_id mfsa2017-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
56
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
57
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
58
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
59
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7751
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jwnz-gnjs-1uaa
11
url VCID-k79j-1yvn-qfd2
vulnerability_id VCID-k79j-1yvn-qfd2
summary
Multiple vulnerabilities have been found in Graphite, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7776.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7776
reference_id
reference_type
scores
0
value 0.00618
scoring_system epss
scoring_elements 0.69885
published_at 2026-04-01T12:55:00Z
1
value 0.00618
scoring_system epss
scoring_elements 0.69983
published_at 2026-04-21T12:55:00Z
2
value 0.00618
scoring_system epss
scoring_elements 0.69953
published_at 2026-04-09T12:55:00Z
3
value 0.00618
scoring_system epss
scoring_elements 0.69976
published_at 2026-04-11T12:55:00Z
4
value 0.00618
scoring_system epss
scoring_elements 0.69961
published_at 2026-04-12T12:55:00Z
5
value 0.00618
scoring_system epss
scoring_elements 0.69947
published_at 2026-04-13T12:55:00Z
6
value 0.00618
scoring_system epss
scoring_elements 0.69991
published_at 2026-04-16T12:55:00Z
7
value 0.00618
scoring_system epss
scoring_elements 0.70001
published_at 2026-04-18T12:55:00Z
8
value 0.00618
scoring_system epss
scoring_elements 0.69897
published_at 2026-04-02T12:55:00Z
9
value 0.00618
scoring_system epss
scoring_elements 0.69911
published_at 2026-04-04T12:55:00Z
10
value 0.00618
scoring_system epss
scoring_elements 0.69888
published_at 2026-04-07T12:55:00Z
11
value 0.00618
scoring_system epss
scoring_elements 0.69936
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7776
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472223
reference_id 1472223
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472223
23
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
24
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
25
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
26
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7776
reference_id CVE-2017-7776
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7776
30
reference_url https://security.gentoo.org/glsa/201710-13
reference_id GLSA-201710-13
reference_type
scores
url https://security.gentoo.org/glsa/201710-13
31
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
32
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
33
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
34
reference_url https://access.redhat.com/errata/RHSA-2017:1793
reference_id RHSA-2017:1793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1793
35
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
36
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
37
reference_url https://usn.ubuntu.com/3398-1/
reference_id USN-3398-1
reference_type
scores
url https://usn.ubuntu.com/3398-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7776
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k79j-1yvn-qfd2
12
url VCID-nyn2-zf8c-67cb
vulnerability_id VCID-nyn2-zf8c-67cb
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7750.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7750.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7750
reference_id
reference_type
scores
0
value 0.01874
scoring_system epss
scoring_elements 0.83158
published_at 2026-04-21T12:55:00Z
1
value 0.01874
scoring_system epss
scoring_elements 0.83081
published_at 2026-04-04T12:55:00Z
2
value 0.01874
scoring_system epss
scoring_elements 0.83079
published_at 2026-04-07T12:55:00Z
3
value 0.01874
scoring_system epss
scoring_elements 0.83103
published_at 2026-04-08T12:55:00Z
4
value 0.01874
scoring_system epss
scoring_elements 0.83111
published_at 2026-04-09T12:55:00Z
5
value 0.01874
scoring_system epss
scoring_elements 0.83127
published_at 2026-04-11T12:55:00Z
6
value 0.01874
scoring_system epss
scoring_elements 0.83121
published_at 2026-04-12T12:55:00Z
7
value 0.01874
scoring_system epss
scoring_elements 0.83117
published_at 2026-04-13T12:55:00Z
8
value 0.01874
scoring_system epss
scoring_elements 0.83154
published_at 2026-04-16T12:55:00Z
9
value 0.01874
scoring_system epss
scoring_elements 0.83155
published_at 2026-04-18T12:55:00Z
10
value 0.01874
scoring_system epss
scoring_elements 0.83051
published_at 2026-04-01T12:55:00Z
11
value 0.01874
scoring_system epss
scoring_elements 0.83067
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7750
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1356558
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1356558
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://www.debian.org/security/2017/dsa-3881
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3881
23
reference_url https://www.debian.org/security/2017/dsa-3918
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3918
24
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
25
reference_url https://www.mozilla.org/security/advisories/mfsa2017-16/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-16/
26
reference_url https://www.mozilla.org/security/advisories/mfsa2017-17/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-17/
27
reference_url http://www.securityfocus.com/bid/99057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99057
28
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461254
reference_id 1461254
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461254
30
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
31
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
32
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
33
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7750
reference_id CVE-2017-7750
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7750
52
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
reference_id mfsa2017-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
reference_id mfsa2017-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
56
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
57
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
58
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
59
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7750
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nyn2-zf8c-67cb
13
url VCID-pmwj-2v2k-nfcb
vulnerability_id VCID-pmwj-2v2k-nfcb
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7758.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7758.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7758
reference_id
reference_type
scores
0
value 0.01684
scoring_system epss
scoring_elements 0.82237
published_at 2026-04-21T12:55:00Z
1
value 0.01684
scoring_system epss
scoring_elements 0.82235
published_at 2026-04-18T12:55:00Z
2
value 0.01684
scoring_system epss
scoring_elements 0.82128
published_at 2026-04-01T12:55:00Z
3
value 0.01684
scoring_system epss
scoring_elements 0.82199
published_at 2026-04-13T12:55:00Z
4
value 0.01684
scoring_system epss
scoring_elements 0.82205
published_at 2026-04-12T12:55:00Z
5
value 0.01684
scoring_system epss
scoring_elements 0.82213
published_at 2026-04-11T12:55:00Z
6
value 0.01684
scoring_system epss
scoring_elements 0.82193
published_at 2026-04-09T12:55:00Z
7
value 0.01684
scoring_system epss
scoring_elements 0.82163
published_at 2026-04-04T12:55:00Z
8
value 0.01684
scoring_system epss
scoring_elements 0.8216
published_at 2026-04-07T12:55:00Z
9
value 0.01684
scoring_system epss
scoring_elements 0.82186
published_at 2026-04-08T12:55:00Z
10
value 0.01684
scoring_system epss
scoring_elements 0.82142
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7758
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1368490
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1368490
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://www.debian.org/security/2017/dsa-3881
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3881
23
reference_url https://www.debian.org/security/2017/dsa-3918
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3918
24
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
25
reference_url https://www.mozilla.org/security/advisories/mfsa2017-16/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-16/
26
reference_url https://www.mozilla.org/security/advisories/mfsa2017-17/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-17/
27
reference_url http://www.securityfocus.com/bid/99057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99057
28
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461261
reference_id 1461261
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461261
30
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
31
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
32
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
33
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7758
reference_id CVE-2017-7758
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7758
51
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
reference_id mfsa2017-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
reference_id mfsa2017-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
55
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
56
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
57
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
58
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7758
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmwj-2v2k-nfcb
14
url VCID-pww9-m9d4-euew
vulnerability_id VCID-pww9-m9d4-euew
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7752.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7752.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7752
reference_id
reference_type
scores
0
value 0.00972
scoring_system epss
scoring_elements 0.76679
published_at 2026-04-21T12:55:00Z
1
value 0.00972
scoring_system epss
scoring_elements 0.76622
published_at 2026-04-04T12:55:00Z
2
value 0.00972
scoring_system epss
scoring_elements 0.76603
published_at 2026-04-07T12:55:00Z
3
value 0.00972
scoring_system epss
scoring_elements 0.76635
published_at 2026-04-08T12:55:00Z
4
value 0.00972
scoring_system epss
scoring_elements 0.76647
published_at 2026-04-09T12:55:00Z
5
value 0.00972
scoring_system epss
scoring_elements 0.76673
published_at 2026-04-11T12:55:00Z
6
value 0.00972
scoring_system epss
scoring_elements 0.76653
published_at 2026-04-12T12:55:00Z
7
value 0.00972
scoring_system epss
scoring_elements 0.76644
published_at 2026-04-13T12:55:00Z
8
value 0.00972
scoring_system epss
scoring_elements 0.76686
published_at 2026-04-16T12:55:00Z
9
value 0.00972
scoring_system epss
scoring_elements 0.7669
published_at 2026-04-18T12:55:00Z
10
value 0.00972
scoring_system epss
scoring_elements 0.7659
published_at 2026-04-01T12:55:00Z
11
value 0.00972
scoring_system epss
scoring_elements 0.76594
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7752
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1359547
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1359547
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://www.debian.org/security/2017/dsa-3881
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3881
23
reference_url https://www.debian.org/security/2017/dsa-3918
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3918
24
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
25
reference_url https://www.mozilla.org/security/advisories/mfsa2017-16/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-16/
26
reference_url https://www.mozilla.org/security/advisories/mfsa2017-17/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-17/
27
reference_url http://www.securityfocus.com/bid/99057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99057
28
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461256
reference_id 1461256
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461256
30
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
31
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
32
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
33
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7752
reference_id CVE-2017-7752
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7752
52
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
reference_id mfsa2017-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
reference_id mfsa2017-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
56
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
57
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
58
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
59
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7752
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pww9-m9d4-euew
15
url VCID-qhes-9dcx-tbb5
vulnerability_id VCID-qhes-9dcx-tbb5
summary
Multiple vulnerabilities have been found in Graphite, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7777.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7777
reference_id
reference_type
scores
0
value 0.00495
scoring_system epss
scoring_elements 0.65693
published_at 2026-04-01T12:55:00Z
1
value 0.00495
scoring_system epss
scoring_elements 0.65812
published_at 2026-04-21T12:55:00Z
2
value 0.00495
scoring_system epss
scoring_elements 0.65801
published_at 2026-04-09T12:55:00Z
3
value 0.00495
scoring_system epss
scoring_elements 0.65822
published_at 2026-04-11T12:55:00Z
4
value 0.00495
scoring_system epss
scoring_elements 0.65807
published_at 2026-04-12T12:55:00Z
5
value 0.00495
scoring_system epss
scoring_elements 0.65777
published_at 2026-04-13T12:55:00Z
6
value 0.00495
scoring_system epss
scoring_elements 0.65811
published_at 2026-04-16T12:55:00Z
7
value 0.00495
scoring_system epss
scoring_elements 0.65826
published_at 2026-04-18T12:55:00Z
8
value 0.00495
scoring_system epss
scoring_elements 0.65742
published_at 2026-04-02T12:55:00Z
9
value 0.00495
scoring_system epss
scoring_elements 0.65772
published_at 2026-04-04T12:55:00Z
10
value 0.00495
scoring_system epss
scoring_elements 0.65737
published_at 2026-04-07T12:55:00Z
11
value 0.00495
scoring_system epss
scoring_elements 0.6579
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472225
reference_id 1472225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472225
23
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
24
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
25
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
26
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7777
reference_id CVE-2017-7777
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7777
30
reference_url https://security.gentoo.org/glsa/201710-13
reference_id GLSA-201710-13
reference_type
scores
url https://security.gentoo.org/glsa/201710-13
31
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
32
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
33
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
34
reference_url https://access.redhat.com/errata/RHSA-2017:1793
reference_id RHSA-2017:1793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1793
35
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
36
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
37
reference_url https://usn.ubuntu.com/3398-1/
reference_id USN-3398-1
reference_type
scores
url https://usn.ubuntu.com/3398-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7777
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qhes-9dcx-tbb5
16
url VCID-rsqj-18a5-23gd
vulnerability_id VCID-rsqj-18a5-23gd
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5470.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5470.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5470
reference_id
reference_type
scores
0
value 0.01874
scoring_system epss
scoring_elements 0.83158
published_at 2026-04-21T12:55:00Z
1
value 0.01874
scoring_system epss
scoring_elements 0.83081
published_at 2026-04-04T12:55:00Z
2
value 0.01874
scoring_system epss
scoring_elements 0.83079
published_at 2026-04-07T12:55:00Z
3
value 0.01874
scoring_system epss
scoring_elements 0.83103
published_at 2026-04-08T12:55:00Z
4
value 0.01874
scoring_system epss
scoring_elements 0.83111
published_at 2026-04-09T12:55:00Z
5
value 0.01874
scoring_system epss
scoring_elements 0.83127
published_at 2026-04-11T12:55:00Z
6
value 0.01874
scoring_system epss
scoring_elements 0.83121
published_at 2026-04-12T12:55:00Z
7
value 0.01874
scoring_system epss
scoring_elements 0.83117
published_at 2026-04-13T12:55:00Z
8
value 0.01874
scoring_system epss
scoring_elements 0.83154
published_at 2026-04-16T12:55:00Z
9
value 0.01874
scoring_system epss
scoring_elements 0.83155
published_at 2026-04-18T12:55:00Z
10
value 0.01874
scoring_system epss
scoring_elements 0.83051
published_at 2026-04-01T12:55:00Z
11
value 0.01874
scoring_system epss
scoring_elements 0.83067
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5470
2
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1359639%2C1349595%2C1352295%2C1352556%2C1342552%2C1342567%2C1346012%2C1366140%2C1368732%2C1297111%2C1362590%2C1357462%2C1363280%2C1349266%2C1352093%2C1348424%2C1347748%2C1356025%2C1325513%2C1367692
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1359639%2C1349595%2C1352295%2C1352556%2C1342552%2C1342567%2C1346012%2C1366140%2C1368732%2C1297111%2C1362590%2C1357462%2C1363280%2C1349266%2C1352093%2C1348424%2C1347748%2C1356025%2C1325513%2C1367692
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://www.debian.org/security/2017/dsa-3881
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3881
23
reference_url https://www.debian.org/security/2017/dsa-3918
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3918
24
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
25
reference_url https://www.mozilla.org/security/advisories/mfsa2017-16/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-16/
26
reference_url https://www.mozilla.org/security/advisories/mfsa2017-17/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-17/
27
reference_url http://www.securityfocus.com/bid/99041
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99041
28
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461264
reference_id 1461264
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461264
30
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
31
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
32
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
33
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5470
reference_id CVE-2017-5470
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5470
52
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
reference_id mfsa2017-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
reference_id mfsa2017-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
56
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
57
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
58
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
59
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-5470
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rsqj-18a5-23gd
17
url VCID-sncj-cwvy-ckdf
vulnerability_id VCID-sncj-cwvy-ckdf
summary
Multiple vulnerabilities have been found in Graphite, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7778.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7778.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7778
reference_id
reference_type
scores
0
value 0.0106
scoring_system epss
scoring_elements 0.77679
published_at 2026-04-16T12:55:00Z
1
value 0.0106
scoring_system epss
scoring_elements 0.77641
published_at 2026-04-13T12:55:00Z
2
value 0.0106
scoring_system epss
scoring_elements 0.77583
published_at 2026-04-01T12:55:00Z
3
value 0.0106
scoring_system epss
scoring_elements 0.77643
published_at 2026-04-12T12:55:00Z
4
value 0.0106
scoring_system epss
scoring_elements 0.77659
published_at 2026-04-11T12:55:00Z
5
value 0.0106
scoring_system epss
scoring_elements 0.77633
published_at 2026-04-09T12:55:00Z
6
value 0.0106
scoring_system epss
scoring_elements 0.77627
published_at 2026-04-08T12:55:00Z
7
value 0.0106
scoring_system epss
scoring_elements 0.77598
published_at 2026-04-07T12:55:00Z
8
value 0.0106
scoring_system epss
scoring_elements 0.7759
published_at 2026-04-02T12:55:00Z
9
value 0.0106
scoring_system epss
scoring_elements 0.77616
published_at 2026-04-04T12:55:00Z
10
value 0.01434
scoring_system epss
scoring_elements 0.80719
published_at 2026-04-21T12:55:00Z
11
value 0.01434
scoring_system epss
scoring_elements 0.80716
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7778
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1349310
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1349310
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1350047
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1350047
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1352745
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1352745
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1352747
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1352747
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1355174
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1355174
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1355182
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1355182
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1356607
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1356607
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1358551
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1358551
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
28
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
29
reference_url https://www.debian.org/security/2017/dsa-3881
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3881
30
reference_url https://www.debian.org/security/2017/dsa-3894
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3894
31
reference_url https://www.debian.org/security/2017/dsa-3918
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3918
32
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
33
reference_url https://www.mozilla.org/security/advisories/mfsa2017-16/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-16/
34
reference_url https://www.mozilla.org/security/advisories/mfsa2017-17/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-17/
35
reference_url http://www.securityfocus.com/bid/99057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99057
36
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461260
reference_id 1461260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461260
38
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
39
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
40
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
41
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7778
reference_id CVE-2017-7778
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7778
48
reference_url https://security.gentoo.org/glsa/201710-13
reference_id GLSA-201710-13
reference_type
scores
url https://security.gentoo.org/glsa/201710-13
49
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
51
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
reference_id mfsa2017-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
reference_id mfsa2017-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
53
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
54
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
55
reference_url https://access.redhat.com/errata/RHSA-2017:1793
reference_id RHSA-2017:1793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1793
56
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
57
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
58
reference_url https://usn.ubuntu.com/3398-1/
reference_id USN-3398-1
reference_type
scores
url https://usn.ubuntu.com/3398-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7778
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sncj-cwvy-ckdf
18
url VCID-xztj-hyqy-gug6
vulnerability_id VCID-xztj-hyqy-gug6
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5472.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5472.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5472
reference_id
reference_type
scores
0
value 0.01874
scoring_system epss
scoring_elements 0.83158
published_at 2026-04-21T12:55:00Z
1
value 0.01874
scoring_system epss
scoring_elements 0.83081
published_at 2026-04-04T12:55:00Z
2
value 0.01874
scoring_system epss
scoring_elements 0.83079
published_at 2026-04-07T12:55:00Z
3
value 0.01874
scoring_system epss
scoring_elements 0.83103
published_at 2026-04-08T12:55:00Z
4
value 0.01874
scoring_system epss
scoring_elements 0.83111
published_at 2026-04-09T12:55:00Z
5
value 0.01874
scoring_system epss
scoring_elements 0.83127
published_at 2026-04-11T12:55:00Z
6
value 0.01874
scoring_system epss
scoring_elements 0.83121
published_at 2026-04-12T12:55:00Z
7
value 0.01874
scoring_system epss
scoring_elements 0.83117
published_at 2026-04-13T12:55:00Z
8
value 0.01874
scoring_system epss
scoring_elements 0.83154
published_at 2026-04-16T12:55:00Z
9
value 0.01874
scoring_system epss
scoring_elements 0.83155
published_at 2026-04-18T12:55:00Z
10
value 0.01874
scoring_system epss
scoring_elements 0.83051
published_at 2026-04-01T12:55:00Z
11
value 0.01874
scoring_system epss
scoring_elements 0.83067
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5472
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1365602
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1365602
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://www.debian.org/security/2017/dsa-3881
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3881
23
reference_url https://www.debian.org/security/2017/dsa-3918
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3918
24
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
25
reference_url https://www.mozilla.org/security/advisories/mfsa2017-16/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-16/
26
reference_url https://www.mozilla.org/security/advisories/mfsa2017-17/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-17/
27
reference_url http://www.securityfocus.com/bid/99040
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99040
28
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461252
reference_id 1461252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461252
30
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
31
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
32
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
33
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5472
reference_id CVE-2017-5472
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5472
52
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
53
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
reference_id mfsa2017-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
reference_id mfsa2017-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
56
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
57
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
58
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
59
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-5472
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xztj-hyqy-gug6
19
url VCID-z3r1-zkkw-8fhq
vulnerability_id VCID-z3r1-zkkw-8fhq
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7756.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7756.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7756
reference_id
reference_type
scores
0
value 0.01874
scoring_system epss
scoring_elements 0.83158
published_at 2026-04-21T12:55:00Z
1
value 0.01874
scoring_system epss
scoring_elements 0.83081
published_at 2026-04-04T12:55:00Z
2
value 0.01874
scoring_system epss
scoring_elements 0.83079
published_at 2026-04-07T12:55:00Z
3
value 0.01874
scoring_system epss
scoring_elements 0.83103
published_at 2026-04-08T12:55:00Z
4
value 0.01874
scoring_system epss
scoring_elements 0.83111
published_at 2026-04-09T12:55:00Z
5
value 0.01874
scoring_system epss
scoring_elements 0.83127
published_at 2026-04-11T12:55:00Z
6
value 0.01874
scoring_system epss
scoring_elements 0.83121
published_at 2026-04-12T12:55:00Z
7
value 0.01874
scoring_system epss
scoring_elements 0.83117
published_at 2026-04-13T12:55:00Z
8
value 0.01874
scoring_system epss
scoring_elements 0.83154
published_at 2026-04-16T12:55:00Z
9
value 0.01874
scoring_system epss
scoring_elements 0.83155
published_at 2026-04-18T12:55:00Z
10
value 0.01874
scoring_system epss
scoring_elements 0.83051
published_at 2026-04-01T12:55:00Z
11
value 0.01874
scoring_system epss
scoring_elements 0.83067
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7756
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1366595
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1366595
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://www.debian.org/security/2017/dsa-3881
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3881
23
reference_url https://www.debian.org/security/2017/dsa-3918
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3918
24
reference_url https://www.mozilla.org/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-15/
25
reference_url https://www.mozilla.org/security/advisories/mfsa2017-16/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-16/
26
reference_url https://www.mozilla.org/security/advisories/mfsa2017-17/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-17/
27
reference_url http://www.securityfocus.com/bid/99057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99057
28
reference_url http://www.securitytracker.com/id/1038689
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038689
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461258
reference_id 1461258
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461258
30
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
31
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
32
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
33
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7756
reference_id CVE-2017-7756
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7756
39
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
40
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
reference_id mfsa2017-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
reference_id mfsa2017-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-16
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
reference_id mfsa2017-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-17
43
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
44
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
45
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
46
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7756
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z3r1-zkkw-8fhq
20
url VCID-z7sd-q1rk-jqa7
vulnerability_id VCID-z7sd-q1rk-jqa7
summary
Multiple vulnerabilities have been found in Graphite, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7773.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7773.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7773
reference_id
reference_type
scores
0
value 0.00618
scoring_system epss
scoring_elements 0.69885
published_at 2026-04-01T12:55:00Z
1
value 0.00618
scoring_system epss
scoring_elements 0.69983
published_at 2026-04-21T12:55:00Z
2
value 0.00618
scoring_system epss
scoring_elements 0.69953
published_at 2026-04-09T12:55:00Z
3
value 0.00618
scoring_system epss
scoring_elements 0.69976
published_at 2026-04-11T12:55:00Z
4
value 0.00618
scoring_system epss
scoring_elements 0.69961
published_at 2026-04-12T12:55:00Z
5
value 0.00618
scoring_system epss
scoring_elements 0.69947
published_at 2026-04-13T12:55:00Z
6
value 0.00618
scoring_system epss
scoring_elements 0.69991
published_at 2026-04-16T12:55:00Z
7
value 0.00618
scoring_system epss
scoring_elements 0.70001
published_at 2026-04-18T12:55:00Z
8
value 0.00618
scoring_system epss
scoring_elements 0.69897
published_at 2026-04-02T12:55:00Z
9
value 0.00618
scoring_system epss
scoring_elements 0.69911
published_at 2026-04-04T12:55:00Z
10
value 0.00618
scoring_system epss
scoring_elements 0.69888
published_at 2026-04-07T12:55:00Z
11
value 0.00618
scoring_system epss
scoring_elements 0.69936
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7773
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472215
reference_id 1472215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472215
23
reference_url https://security.archlinux.org/ASA-201706-19
reference_id ASA-201706-19
reference_type
scores
url https://security.archlinux.org/ASA-201706-19
24
reference_url https://security.archlinux.org/ASA-201706-20
reference_id ASA-201706-20
reference_type
scores
url https://security.archlinux.org/ASA-201706-20
25
reference_url https://security.archlinux.org/AVG-302
reference_id AVG-302
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-302
26
reference_url https://security.archlinux.org/AVG-303
reference_id AVG-303
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-303
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7773
reference_id CVE-2017-7773
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7773
30
reference_url https://security.gentoo.org/glsa/201710-13
reference_id GLSA-201710-13
reference_type
scores
url https://security.gentoo.org/glsa/201710-13
31
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
32
reference_url https://access.redhat.com/errata/RHSA-2017:1440
reference_id RHSA-2017:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1440
33
reference_url https://access.redhat.com/errata/RHSA-2017:1561
reference_id RHSA-2017:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1561
34
reference_url https://access.redhat.com/errata/RHSA-2017:1793
reference_id RHSA-2017:1793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1793
35
reference_url https://usn.ubuntu.com/3315-1/
reference_id USN-3315-1
reference_type
scores
url https://usn.ubuntu.com/3315-1/
36
reference_url https://usn.ubuntu.com/3321-1/
reference_id USN-3321-1
reference_type
scores
url https://usn.ubuntu.com/3321-1/
37
reference_url https://usn.ubuntu.com/3398-1/
reference_id USN-3398-1
reference_type
scores
url https://usn.ubuntu.com/3398-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@54.0-1
purl pkg:alpm/archlinux/firefox@54.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1
aliases CVE-2017-7773
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7sd-q1rk-jqa7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0-1