Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
Typeapk
Namespacealpine
Namefirefox-esr
Version115.6.0-r0
Qualifiers
arch ppc64le
distroversion v3.20
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version115.17.0-r0
Latest_non_vulnerable_version115.17.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4g3s-bh4t-qqhc
vulnerability_id VCID-4g3s-bh4t-qqhc
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6867.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6867.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6867
reference_id
reference_type
scores
0
value 0.00857
scoring_system epss
scoring_elements 0.75021
published_at 2026-04-21T12:55:00Z
1
value 0.00931
scoring_system epss
scoring_elements 0.7608
published_at 2026-04-04T12:55:00Z
2
value 0.00931
scoring_system epss
scoring_elements 0.76048
published_at 2026-04-02T12:55:00Z
3
value 0.00931
scoring_system epss
scoring_elements 0.7606
published_at 2026-04-07T12:55:00Z
4
value 0.00931
scoring_system epss
scoring_elements 0.76093
published_at 2026-04-08T12:55:00Z
5
value 0.00931
scoring_system epss
scoring_elements 0.76107
published_at 2026-04-09T12:55:00Z
6
value 0.00931
scoring_system epss
scoring_elements 0.76132
published_at 2026-04-11T12:55:00Z
7
value 0.00931
scoring_system epss
scoring_elements 0.76108
published_at 2026-04-12T12:55:00Z
8
value 0.00931
scoring_system epss
scoring_elements 0.76106
published_at 2026-04-13T12:55:00Z
9
value 0.00931
scoring_system epss
scoring_elements 0.76147
published_at 2026-04-16T12:55:00Z
10
value 0.00931
scoring_system epss
scoring_elements 0.7615
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6867
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255366
reference_id 2255366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255366
14
reference_url https://www.debian.org/security/2023/dsa-5581
reference_id dsa-5581
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://www.debian.org/security/2023/dsa-5581
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-54/
reference_id mfsa2023-54
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://www.mozilla.org/security/advisories/mfsa2023-54/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
19
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
20
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
21
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
22
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
23
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
24
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
25
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
26
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
27
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
28
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
29
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1863863
reference_id show_bug.cgi?id=1863863
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1863863
30
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community
aliases CVE-2023-6867
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4g3s-bh4t-qqhc
1
url VCID-5qf5-d44c-t7gu
vulnerability_id VCID-5qf5-d44c-t7gu
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6862
reference_id
reference_type
scores
0
value 0.00367
scoring_system epss
scoring_elements 0.58658
published_at 2026-04-08T12:55:00Z
1
value 0.00367
scoring_system epss
scoring_elements 0.58682
published_at 2026-04-11T12:55:00Z
2
value 0.00367
scoring_system epss
scoring_elements 0.58636
published_at 2026-04-04T12:55:00Z
3
value 0.00367
scoring_system epss
scoring_elements 0.58606
published_at 2026-04-07T12:55:00Z
4
value 0.00367
scoring_system epss
scoring_elements 0.58664
published_at 2026-04-09T12:55:00Z
5
value 0.00367
scoring_system epss
scoring_elements 0.58615
published_at 2026-04-02T12:55:00Z
6
value 0.00367
scoring_system epss
scoring_elements 0.5868
published_at 2026-04-18T12:55:00Z
7
value 0.00367
scoring_system epss
scoring_elements 0.58675
published_at 2026-04-16T12:55:00Z
8
value 0.00367
scoring_system epss
scoring_elements 0.58643
published_at 2026-04-13T12:55:00Z
9
value 0.00367
scoring_system epss
scoring_elements 0.58663
published_at 2026-04-12T12:55:00Z
10
value 0.00441
scoring_system epss
scoring_elements 0.63264
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6862
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255368
reference_id 2255368
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255368
17
reference_url https://www.debian.org/security/2023/dsa-5581
reference_id dsa-5581
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://www.debian.org/security/2023/dsa-5581
18
reference_url https://www.debian.org/security/2023/dsa-5582
reference_id dsa-5582
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://www.debian.org/security/2023/dsa-5582
19
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
21
reference_url https://www.mozilla.org/security/advisories/mfsa2023-54/
reference_id mfsa2023-54
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://www.mozilla.org/security/advisories/mfsa2023-54/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
23
reference_url https://www.mozilla.org/security/advisories/mfsa2023-55/
reference_id mfsa2023-55
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://www.mozilla.org/security/advisories/mfsa2023-55/
24
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
25
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
26
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
27
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
28
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
29
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
30
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
31
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
32
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
33
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
34
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
35
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
36
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
37
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
38
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
39
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
40
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
41
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
42
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
43
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
44
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1868042
reference_id show_bug.cgi?id=1868042
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1868042
45
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community
aliases CVE-2023-6862
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5qf5-d44c-t7gu
2
url VCID-9saf-1zax-5ycy
vulnerability_id VCID-9saf-1zax-5ycy
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6865.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6865.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6865
reference_id
reference_type
scores
0
value 0.00414
scoring_system epss
scoring_elements 0.61565
published_at 2026-04-21T12:55:00Z
1
value 0.00682
scoring_system epss
scoring_elements 0.7159
published_at 2026-04-04T12:55:00Z
2
value 0.00682
scoring_system epss
scoring_elements 0.71563
published_at 2026-04-07T12:55:00Z
3
value 0.00682
scoring_system epss
scoring_elements 0.71603
published_at 2026-04-08T12:55:00Z
4
value 0.00682
scoring_system epss
scoring_elements 0.71614
published_at 2026-04-09T12:55:00Z
5
value 0.00682
scoring_system epss
scoring_elements 0.71572
published_at 2026-04-02T12:55:00Z
6
value 0.00682
scoring_system epss
scoring_elements 0.71647
published_at 2026-04-16T12:55:00Z
7
value 0.00682
scoring_system epss
scoring_elements 0.71652
published_at 2026-04-18T12:55:00Z
8
value 0.00682
scoring_system epss
scoring_elements 0.71637
published_at 2026-04-11T12:55:00Z
9
value 0.00682
scoring_system epss
scoring_elements 0.71621
published_at 2026-04-12T12:55:00Z
10
value 0.00682
scoring_system epss
scoring_elements 0.71602
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6865
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255361
reference_id 2255361
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255361
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
16
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
17
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
18
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
19
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
20
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
21
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
22
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
23
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
24
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
25
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community
aliases CVE-2023-6865
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9saf-1zax-5ycy
3
url VCID-9z3s-qfbc-vbdc
vulnerability_id VCID-9z3s-qfbc-vbdc
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6859
reference_id
reference_type
scores
0
value 0.00375
scoring_system epss
scoring_elements 0.59175
published_at 2026-04-21T12:55:00Z
1
value 0.00449
scoring_system epss
scoring_elements 0.63625
published_at 2026-04-08T12:55:00Z
2
value 0.00449
scoring_system epss
scoring_elements 0.63608
published_at 2026-04-13T12:55:00Z
3
value 0.00449
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-16T12:55:00Z
4
value 0.00449
scoring_system epss
scoring_elements 0.63654
published_at 2026-04-18T12:55:00Z
5
value 0.00449
scoring_system epss
scoring_elements 0.63583
published_at 2026-04-02T12:55:00Z
6
value 0.00449
scoring_system epss
scoring_elements 0.63609
published_at 2026-04-04T12:55:00Z
7
value 0.00449
scoring_system epss
scoring_elements 0.63573
published_at 2026-04-07T12:55:00Z
8
value 0.00449
scoring_system epss
scoring_elements 0.63641
published_at 2026-04-12T12:55:00Z
9
value 0.00449
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6859
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255364
reference_id 2255364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255364
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community
aliases CVE-2023-6859
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9z3s-qfbc-vbdc
4
url VCID-bw96-5g6y-j3c4
vulnerability_id VCID-bw96-5g6y-j3c4
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6860
reference_id
reference_type
scores
0
value 0.00449
scoring_system epss
scoring_elements 0.63638
published_at 2026-04-21T12:55:00Z
1
value 0.00471
scoring_system epss
scoring_elements 0.64619
published_at 2026-04-08T12:55:00Z
2
value 0.00471
scoring_system epss
scoring_elements 0.64612
published_at 2026-04-13T12:55:00Z
3
value 0.00471
scoring_system epss
scoring_elements 0.64648
published_at 2026-04-16T12:55:00Z
4
value 0.00471
scoring_system epss
scoring_elements 0.64659
published_at 2026-04-18T12:55:00Z
5
value 0.00471
scoring_system epss
scoring_elements 0.64584
published_at 2026-04-02T12:55:00Z
6
value 0.00471
scoring_system epss
scoring_elements 0.64613
published_at 2026-04-04T12:55:00Z
7
value 0.00471
scoring_system epss
scoring_elements 0.64571
published_at 2026-04-07T12:55:00Z
8
value 0.00471
scoring_system epss
scoring_elements 0.64636
published_at 2026-04-09T12:55:00Z
9
value 0.00471
scoring_system epss
scoring_elements 0.64653
published_at 2026-04-11T12:55:00Z
10
value 0.00471
scoring_system epss
scoring_elements 0.6464
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6860
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255365
reference_id 2255365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255365
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community
aliases CVE-2023-6860
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bw96-5g6y-j3c4
5
url VCID-f6qv-znt2-2bd5
vulnerability_id VCID-f6qv-znt2-2bd5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6863
reference_id
reference_type
scores
0
value 0.00464
scoring_system epss
scoring_elements 0.6437
published_at 2026-04-21T12:55:00Z
1
value 0.00504
scoring_system epss
scoring_elements 0.66189
published_at 2026-04-08T12:55:00Z
2
value 0.00504
scoring_system epss
scoring_elements 0.66178
published_at 2026-04-13T12:55:00Z
3
value 0.00504
scoring_system epss
scoring_elements 0.66214
published_at 2026-04-16T12:55:00Z
4
value 0.00504
scoring_system epss
scoring_elements 0.66228
published_at 2026-04-18T12:55:00Z
5
value 0.00504
scoring_system epss
scoring_elements 0.66146
published_at 2026-04-02T12:55:00Z
6
value 0.00504
scoring_system epss
scoring_elements 0.66173
published_at 2026-04-04T12:55:00Z
7
value 0.00504
scoring_system epss
scoring_elements 0.66141
published_at 2026-04-07T12:55:00Z
8
value 0.00504
scoring_system epss
scoring_elements 0.66203
published_at 2026-04-09T12:55:00Z
9
value 0.00504
scoring_system epss
scoring_elements 0.66222
published_at 2026-04-11T12:55:00Z
10
value 0.00504
scoring_system epss
scoring_elements 0.66209
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6863
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255369
reference_id 2255369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255369
14
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
18
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
19
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
20
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
21
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
22
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
23
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
24
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
25
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
26
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
27
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
28
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
29
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
30
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
31
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
32
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
33
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
34
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
35
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
36
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
37
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community
aliases CVE-2023-6863
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f6qv-znt2-2bd5
6
url VCID-kskc-agaw-8bcr
vulnerability_id VCID-kskc-agaw-8bcr
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6857
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40745
published_at 2026-04-18T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40775
published_at 2026-04-16T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40755
published_at 2026-04-02T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40783
published_at 2026-04-11T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40707
published_at 2026-04-07T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40757
published_at 2026-04-08T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40764
published_at 2026-04-09T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.4073
published_at 2026-04-13T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40749
published_at 2026-04-12T12:55:00Z
9
value 0.00227
scoring_system epss
scoring_elements 0.45504
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6857
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255362
reference_id 2255362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255362
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community
aliases CVE-2023-6857
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kskc-agaw-8bcr
7
url VCID-pepm-1t68-uuf1
vulnerability_id VCID-pepm-1t68-uuf1
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6864
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.65706
published_at 2026-04-21T12:55:00Z
1
value 0.0059
scoring_system epss
scoring_elements 0.69182
published_at 2026-04-08T12:55:00Z
2
value 0.0059
scoring_system epss
scoring_elements 0.6918
published_at 2026-04-13T12:55:00Z
3
value 0.0059
scoring_system epss
scoring_elements 0.69219
published_at 2026-04-16T12:55:00Z
4
value 0.0059
scoring_system epss
scoring_elements 0.69228
published_at 2026-04-18T12:55:00Z
5
value 0.0059
scoring_system epss
scoring_elements 0.6913
published_at 2026-04-02T12:55:00Z
6
value 0.0059
scoring_system epss
scoring_elements 0.69151
published_at 2026-04-04T12:55:00Z
7
value 0.0059
scoring_system epss
scoring_elements 0.69132
published_at 2026-04-07T12:55:00Z
8
value 0.0059
scoring_system epss
scoring_elements 0.69201
published_at 2026-04-09T12:55:00Z
9
value 0.0059
scoring_system epss
scoring_elements 0.69223
published_at 2026-04-11T12:55:00Z
10
value 0.0059
scoring_system epss
scoring_elements 0.69208
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6864
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255370
reference_id 2255370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255370
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community
aliases CVE-2023-6864
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pepm-1t68-uuf1
8
url VCID-qdqj-rhcr-wbca
vulnerability_id VCID-qdqj-rhcr-wbca
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6856
reference_id
reference_type
scores
0
value 0.10471
scoring_system epss
scoring_elements 0.93268
published_at 2026-04-21T12:55:00Z
1
value 0.10986
scoring_system epss
scoring_elements 0.93413
published_at 2026-04-08T12:55:00Z
2
value 0.10986
scoring_system epss
scoring_elements 0.93422
published_at 2026-04-13T12:55:00Z
3
value 0.10986
scoring_system epss
scoring_elements 0.93441
published_at 2026-04-16T12:55:00Z
4
value 0.10986
scoring_system epss
scoring_elements 0.93446
published_at 2026-04-18T12:55:00Z
5
value 0.10986
scoring_system epss
scoring_elements 0.93397
published_at 2026-04-02T12:55:00Z
6
value 0.10986
scoring_system epss
scoring_elements 0.93405
published_at 2026-04-07T12:55:00Z
7
value 0.10986
scoring_system epss
scoring_elements 0.93416
published_at 2026-04-09T12:55:00Z
8
value 0.10986
scoring_system epss
scoring_elements 0.93421
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6856
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255360
reference_id 2255360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255360
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community
aliases CVE-2023-6856
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqj-rhcr-wbca
9
url VCID-tps4-kxe2-5ugb
vulnerability_id VCID-tps4-kxe2-5ugb
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6858
reference_id
reference_type
scores
0
value 0.00417
scoring_system epss
scoring_elements 0.61769
published_at 2026-04-21T12:55:00Z
1
value 0.00452
scoring_system epss
scoring_elements 0.63778
published_at 2026-04-16T12:55:00Z
2
value 0.00452
scoring_system epss
scoring_elements 0.63723
published_at 2026-04-02T12:55:00Z
3
value 0.00452
scoring_system epss
scoring_elements 0.63748
published_at 2026-04-04T12:55:00Z
4
value 0.00452
scoring_system epss
scoring_elements 0.63788
published_at 2026-04-18T12:55:00Z
5
value 0.00452
scoring_system epss
scoring_elements 0.6376
published_at 2026-04-08T12:55:00Z
6
value 0.00452
scoring_system epss
scoring_elements 0.63708
published_at 2026-04-07T12:55:00Z
7
value 0.00452
scoring_system epss
scoring_elements 0.63742
published_at 2026-04-13T12:55:00Z
8
value 0.00452
scoring_system epss
scoring_elements 0.63776
published_at 2026-04-12T12:55:00Z
9
value 0.00452
scoring_system epss
scoring_elements 0.63791
published_at 2026-04-11T12:55:00Z
10
value 0.00452
scoring_system epss
scoring_elements 0.63777
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6858
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255363
reference_id 2255363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255363
17
reference_url https://www.debian.org/security/2023/dsa-5581
reference_id dsa-5581
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.debian.org/security/2023/dsa-5581
18
reference_url https://www.debian.org/security/2023/dsa-5582
reference_id dsa-5582
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.debian.org/security/2023/dsa-5582
19
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
21
reference_url https://www.mozilla.org/security/advisories/mfsa2023-54/
reference_id mfsa2023-54
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.mozilla.org/security/advisories/mfsa2023-54/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
23
reference_url https://www.mozilla.org/security/advisories/mfsa2023-55/
reference_id mfsa2023-55
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.mozilla.org/security/advisories/mfsa2023-55/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
25
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
26
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
27
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
28
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
29
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
30
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
31
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
32
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
33
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
34
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
35
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
36
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
37
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
38
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
39
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
40
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
41
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
42
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
43
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
44
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
45
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
46
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1826791
reference_id show_bug.cgi?id=1826791
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1826791
47
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
48
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community
aliases CVE-2023-6858
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tps4-kxe2-5ugb
10
url VCID-zhu4-sy56-1yea
vulnerability_id VCID-zhu4-sy56-1yea
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6861
reference_id
reference_type
scores
0
value 0.00415
scoring_system epss
scoring_elements 0.6171
published_at 2026-04-18T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61704
published_at 2026-04-16T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61609
published_at 2026-04-07T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61639
published_at 2026-04-04T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.61658
published_at 2026-04-08T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61672
published_at 2026-04-09T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.61694
published_at 2026-04-11T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61663
published_at 2026-04-13T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61682
published_at 2026-04-12T12:55:00Z
9
value 0.00499
scoring_system epss
scoring_elements 0.65975
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6861
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255367
reference_id 2255367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255367
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=ppc64le&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community
aliases CVE-2023-6861
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhu4-sy56-1yea
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community