Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/379484?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/379484?format=api", "purl": "pkg:apk/alpine/firefox-esr@115.1.0-r0?arch=aarch64&distroversion=v3.18&reponame=community", "type": "apk", "namespace": "alpine", "name": "firefox-esr", "version": "115.1.0-r0", "qualifiers": { "arch": "aarch64", "distroversion": "v3.18", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "115.2.0-r0", "latest_non_vulnerable_version": "115.17.0-r0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51396?format=api", "vulnerability_id": "VCID-32pc-j3he-pffx", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4055.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4055.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57397", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57375", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57395", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57416", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57348", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57347", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57371", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57401", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57399", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228367", "reference_id": "2228367", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228367" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1782561", "reference_id": "show_bug.cgi?id=1782561", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1782561" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/379484?format=api", "purl": "pkg:apk/alpine/firefox-esr@115.1.0-r0?arch=aarch64&distroversion=v3.18&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.1.0-r0%3Farch=aarch64&distroversion=v3.18&reponame=community" } ], "aliases": [ "CVE-2023-4055" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-32pc-j3he-pffx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51388?format=api", "vulnerability_id": "VCID-6tm9-1vsh-1qa3", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4047.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4047.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66804", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66837", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66851", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.6683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66769", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66767", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66795", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66816", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228362", "reference_id": "2228362", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228362" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839073", "reference_id": "show_bug.cgi?id=1839073", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839073" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/379484?format=api", "purl": "pkg:apk/alpine/firefox-esr@115.1.0-r0?arch=aarch64&distroversion=v3.18&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.1.0-r0%3Farch=aarch64&distroversion=v3.18&reponame=community" } ], "aliases": [ "CVE-2023-4047" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6tm9-1vsh-1qa3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51398?format=api", "vulnerability_id": "VCID-7sbd-1n7f-ryed", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4057.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4057.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4057", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44622", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44567", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44639", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44609", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44658", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44665", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4461", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4463", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4057" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228371", "reference_id": "2228371", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228371" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-33/", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-33/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1841682", "reference_id": "show_bug.cgi?id=1841682", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1841682" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/379484?format=api", "purl": "pkg:apk/alpine/firefox-esr@115.1.0-r0?arch=aarch64&distroversion=v3.18&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.1.0-r0%3Farch=aarch64&distroversion=v3.18&reponame=community" } ], "aliases": [ "CVE-2023-4057" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7sbd-1n7f-ryed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51390?format=api", "vulnerability_id": "VCID-878b-mn4w-wkg4", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4049.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4049.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52951", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52944", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52907", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52923", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.5285", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52876", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52939", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52889", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52895", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228364", "reference_id": "2228364", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228364" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842658", "reference_id": "show_bug.cgi?id=1842658", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842658" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/379484?format=api", "purl": "pkg:apk/alpine/firefox-esr@115.1.0-r0?arch=aarch64&distroversion=v3.18&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.1.0-r0%3Farch=aarch64&distroversion=v3.18&reponame=community" } ], "aliases": [ "CVE-2023-4049" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-878b-mn4w-wkg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51389?format=api", "vulnerability_id": "VCID-8dgu-ppan-9ub2", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4048.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4048.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64082", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.6407", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64036", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64065", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64012", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.6404", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64079", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64067", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64051", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228363", "reference_id": "2228363", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228363" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1841368", "reference_id": "show_bug.cgi?id=1841368", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1841368" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/379484?format=api", "purl": "pkg:apk/alpine/firefox-esr@115.1.0-r0?arch=aarch64&distroversion=v3.18&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.1.0-r0%3Farch=aarch64&distroversion=v3.18&reponame=community" } ], "aliases": [ "CVE-2023-4048" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8dgu-ppan-9ub2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51393?format=api", "vulnerability_id": "VCID-j2ax-jb2h-byeu", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4052.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4052.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4052", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39484", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.395", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.3951", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39472", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39455", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39506", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39491", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39515", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4052" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228369", "reference_id": "2228369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228369" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-33/", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-33/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1824420", "reference_id": "show_bug.cgi?id=1824420", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1824420" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/379484?format=api", "purl": "pkg:apk/alpine/firefox-esr@115.1.0-r0?arch=aarch64&distroversion=v3.18&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.1.0-r0%3Farch=aarch64&distroversion=v3.18&reponame=community" } ], "aliases": [ "CVE-2023-4052" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2ax-jb2h-byeu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51391?format=api", "vulnerability_id": "VCID-m2sr-re2h-3baq", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4050.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4050.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89273", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.8926", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89263", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89267", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89218", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89235", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89233", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89257", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89253", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228365", "reference_id": "2228365", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228365" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1843038", "reference_id": "show_bug.cgi?id=1843038", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1843038" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/379484?format=api", "purl": "pkg:apk/alpine/firefox-esr@115.1.0-r0?arch=aarch64&distroversion=v3.18&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.1.0-r0%3Farch=aarch64&distroversion=v3.18&reponame=community" } ], "aliases": [ "CVE-2023-4050" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2sr-re2h-3baq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51386?format=api", "vulnerability_id": "VCID-sh7r-dftz-kyhn", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4045.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4045.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55538", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55534", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55515", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55496", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55526", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55474", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55471", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55535", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228360", "reference_id": "2228360", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228360" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1833876", "reference_id": "show_bug.cgi?id=1833876", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1833876" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/379484?format=api", "purl": "pkg:apk/alpine/firefox-esr@115.1.0-r0?arch=aarch64&distroversion=v3.18&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.1.0-r0%3Farch=aarch64&distroversion=v3.18&reponame=community" } ], "aliases": [ "CVE-2023-4045" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sh7r-dftz-kyhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51397?format=api", "vulnerability_id": "VCID-t8gg-ptc1-qfdw", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4056.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4056.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71307", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.713", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71255", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.7127", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71232", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71286", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71263", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71207", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71249", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4056" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228370", "reference_id": "2228370", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228370" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847", "reference_id": "buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/379484?format=api", "purl": "pkg:apk/alpine/firefox-esr@115.1.0-r0?arch=aarch64&distroversion=v3.18&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.1.0-r0%3Farch=aarch64&distroversion=v3.18&reponame=community" } ], "aliases": [ "CVE-2023-4056" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t8gg-ptc1-qfdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51395?format=api", "vulnerability_id": "VCID-tfny-yt17-mffx", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4054.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4054.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4054", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09243", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09254", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09284", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09242", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09164", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09281", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09195", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09114", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09133", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0924", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4054" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228366", "reference_id": "2228366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228366" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-32/", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-32/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-33/", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-33/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1840777", "reference_id": "show_bug.cgi?id=1840777", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1840777" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/379484?format=api", "purl": "pkg:apk/alpine/firefox-esr@115.1.0-r0?arch=aarch64&distroversion=v3.18&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.1.0-r0%3Farch=aarch64&distroversion=v3.18&reponame=community" } ], "aliases": [ "CVE-2023-4054" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tfny-yt17-mffx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51387?format=api", "vulnerability_id": "VCID-vjw1-g5kk-zuda", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4046.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4046.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52906", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52898", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52862", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52804", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.5283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52894", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52843", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52798", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52849", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228361", "reference_id": "2228361", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228361" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1837686", "reference_id": "show_bug.cgi?id=1837686", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1837686" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" }, { "reference_url": "https://usn.ubuntu.com/6406-1/", "reference_id": "USN-6406-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6406-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/379484?format=api", "purl": "pkg:apk/alpine/firefox-esr@115.1.0-r0?arch=aarch64&distroversion=v3.18&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.1.0-r0%3Farch=aarch64&distroversion=v3.18&reponame=community" } ], "aliases": [ "CVE-2023-4046" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vjw1-g5kk-zuda" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.1.0-r0%3Farch=aarch64&distroversion=v3.18&reponame=community" }