Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
Typeapk
Namespacealpine
Namefirefox-esr
Version115.9.0-r0
Qualifiers
arch armv7
distroversion v3.18
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version115.9.1-r0
Latest_non_vulnerable_version115.17.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2tts-gwgd-zqcz
vulnerability_id VCID-2tts-gwgd-zqcz
summary A vulnerability has been discovered in NSS, which can lead to the recovery of private data.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5388.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5388.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5388
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39713
published_at 2026-04-04T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39691
published_at 2026-04-02T12:55:00Z
2
value 0.00245
scoring_system epss
scoring_elements 0.47729
published_at 2026-04-12T12:55:00Z
3
value 0.00245
scoring_system epss
scoring_elements 0.47787
published_at 2026-04-18T12:55:00Z
4
value 0.00245
scoring_system epss
scoring_elements 0.47794
published_at 2026-04-16T12:55:00Z
5
value 0.00245
scoring_system epss
scoring_elements 0.47739
published_at 2026-04-13T12:55:00Z
6
value 0.00245
scoring_system epss
scoring_elements 0.47752
published_at 2026-04-11T12:55:00Z
7
value 0.00245
scoring_system epss
scoring_elements 0.47727
published_at 2026-04-09T12:55:00Z
8
value 0.00245
scoring_system epss
scoring_elements 0.47732
published_at 2026-04-08T12:55:00Z
9
value 0.00245
scoring_system epss
scoring_elements 0.47677
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5388
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056284
reference_id 1056284
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056284
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243644
reference_id 2243644
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243644
15
reference_url https://security.gentoo.org/glsa/202508-04
reference_id GLSA-202508-04
reference_type
scores
url https://security.gentoo.org/glsa/202508-04
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
22
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
23
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
24
reference_url https://access.redhat.com/errata/RHSA-2024:0093
reference_id RHSA-2024:0093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0093
25
reference_url https://access.redhat.com/errata/RHSA-2024:0105
reference_id RHSA-2024:0105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0105
26
reference_url https://access.redhat.com/errata/RHSA-2024:0106
reference_id RHSA-2024:0106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0106
27
reference_url https://access.redhat.com/errata/RHSA-2024:0107
reference_id RHSA-2024:0107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0107
28
reference_url https://access.redhat.com/errata/RHSA-2024:0108
reference_id RHSA-2024:0108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0108
29
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
30
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
31
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
32
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
33
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
34
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
35
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
36
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
37
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
38
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
39
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
40
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
41
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
42
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
43
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
44
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
45
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
46
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
47
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1780432
reference_id show_bug.cgi?id=1780432
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1780432
48
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
49
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
50
reference_url https://usn.ubuntu.com/6727-1/
reference_id USN-6727-1
reference_type
scores
url https://usn.ubuntu.com/6727-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.9.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2023-5388
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2tts-gwgd-zqcz
1
url VCID-3vbp-2h4f-7bav
vulnerability_id VCID-3vbp-2h4f-7bav
summary A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2611.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2611
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46877
published_at 2026-04-02T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46894
published_at 2026-04-04T12:55:00Z
2
value 0.00323
scoring_system epss
scoring_elements 0.55362
published_at 2026-04-13T12:55:00Z
3
value 0.00323
scoring_system epss
scoring_elements 0.5538
published_at 2026-04-12T12:55:00Z
4
value 0.00323
scoring_system epss
scoring_elements 0.55401
published_at 2026-04-18T12:55:00Z
5
value 0.00323
scoring_system epss
scoring_elements 0.55397
published_at 2026-04-16T12:55:00Z
6
value 0.00323
scoring_system epss
scoring_elements 0.55402
published_at 2026-04-11T12:55:00Z
7
value 0.00323
scoring_system epss
scoring_elements 0.55391
published_at 2026-04-09T12:55:00Z
8
value 0.00323
scoring_system epss
scoring_elements 0.55392
published_at 2026-04-08T12:55:00Z
9
value 0.00323
scoring_system epss
scoring_elements 0.55341
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2611
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270664
reference_id 2270664
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270664
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
23
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
24
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
25
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
26
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
27
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
28
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
29
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
30
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
31
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
32
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
33
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
34
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
35
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
36
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
37
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
38
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
39
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1876675
reference_id show_bug.cgi?id=1876675
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1876675
41
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
42
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.9.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-2611
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vbp-2h4f-7bav
2
url VCID-41g2-dvb2-yqhg
vulnerability_id VCID-41g2-dvb2-yqhg
summary Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2614.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2614
reference_id
reference_type
scores
0
value 0.01437
scoring_system epss
scoring_elements 0.80734
published_at 2026-04-18T12:55:00Z
1
value 0.01437
scoring_system epss
scoring_elements 0.80699
published_at 2026-04-13T12:55:00Z
2
value 0.01437
scoring_system epss
scoring_elements 0.80649
published_at 2026-04-02T12:55:00Z
3
value 0.01437
scoring_system epss
scoring_elements 0.80704
published_at 2026-04-09T12:55:00Z
4
value 0.01437
scoring_system epss
scoring_elements 0.80694
published_at 2026-04-08T12:55:00Z
5
value 0.01437
scoring_system epss
scoring_elements 0.80666
published_at 2026-04-07T12:55:00Z
6
value 0.01437
scoring_system epss
scoring_elements 0.80671
published_at 2026-04-04T12:55:00Z
7
value 0.01437
scoring_system epss
scoring_elements 0.80707
published_at 2026-04-12T12:55:00Z
8
value 0.01437
scoring_system epss
scoring_elements 0.80721
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2614
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270666
reference_id 2270666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270666
14
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093
reference_id buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
20
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
23
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
24
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
25
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
26
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
27
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
28
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
29
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
30
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
31
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
32
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
33
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
34
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
35
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
36
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
37
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
38
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
39
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
40
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
41
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
42
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.9.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-2614
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-41g2-dvb2-yqhg
3
url VCID-46cy-x3cp-tke5
vulnerability_id VCID-46cy-x3cp-tke5
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0743.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0743
reference_id
reference_type
scores
0
value 0.00926
scoring_system epss
scoring_elements 0.76077
published_at 2026-04-18T12:55:00Z
1
value 0.00926
scoring_system epss
scoring_elements 0.76074
published_at 2026-04-16T12:55:00Z
2
value 0.00926
scoring_system epss
scoring_elements 0.76033
published_at 2026-04-13T12:55:00Z
3
value 0.00926
scoring_system epss
scoring_elements 0.7599
published_at 2026-04-07T12:55:00Z
4
value 0.00926
scoring_system epss
scoring_elements 0.76037
published_at 2026-04-09T12:55:00Z
5
value 0.00926
scoring_system epss
scoring_elements 0.76023
published_at 2026-04-08T12:55:00Z
6
value 0.00926
scoring_system epss
scoring_elements 0.75979
published_at 2026-04-02T12:55:00Z
7
value 0.00926
scoring_system epss
scoring_elements 0.76011
published_at 2026-04-04T12:55:00Z
8
value 0.00926
scoring_system epss
scoring_elements 0.76039
published_at 2026-04-12T12:55:00Z
9
value 0.00926
scoring_system epss
scoring_elements 0.76062
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2260012
reference_id 2260012
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2260012
14
reference_url https://security.gentoo.org/glsa/202402-26
reference_id GLSA-202402-26
reference_type
scores
url https://security.gentoo.org/glsa/202402-26
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
reference_id mfsa2024-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-01/
reference_id mfsa2024-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://www.mozilla.org/security/advisories/mfsa2024-01/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
20
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
23
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
24
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
25
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
26
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
27
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
28
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
29
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
30
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
31
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
32
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
33
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
34
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
35
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
36
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
37
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
38
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
39
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
40
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
41
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
42
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1867408
reference_id show_bug.cgi?id=1867408
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1867408
43
reference_url https://usn.ubuntu.com/6610-1/
reference_id USN-6610-1
reference_type
scores
url https://usn.ubuntu.com/6610-1/
44
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.9.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-0743
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-46cy-x3cp-tke5
4
url VCID-b5y9-qmw5-nkbv
vulnerability_id VCID-b5y9-qmw5-nkbv
summary If an attacker could find a way to trigger a particular code path in SafeRefPtr, it could have triggered a crash or potentially be leveraged to achieve code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2612.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2612
reference_id
reference_type
scores
0
value 0.01138
scoring_system epss
scoring_elements 0.78349
published_at 2026-04-02T12:55:00Z
1
value 0.01138
scoring_system epss
scoring_elements 0.7838
published_at 2026-04-04T12:55:00Z
2
value 0.01536
scoring_system epss
scoring_elements 0.81339
published_at 2026-04-13T12:55:00Z
3
value 0.01536
scoring_system epss
scoring_elements 0.81347
published_at 2026-04-12T12:55:00Z
4
value 0.01536
scoring_system epss
scoring_elements 0.81379
published_at 2026-04-18T12:55:00Z
5
value 0.01536
scoring_system epss
scoring_elements 0.81377
published_at 2026-04-16T12:55:00Z
6
value 0.01536
scoring_system epss
scoring_elements 0.81361
published_at 2026-04-11T12:55:00Z
7
value 0.01536
scoring_system epss
scoring_elements 0.81341
published_at 2026-04-09T12:55:00Z
8
value 0.01536
scoring_system epss
scoring_elements 0.81335
published_at 2026-04-08T12:55:00Z
9
value 0.01536
scoring_system epss
scoring_elements 0.81307
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2612
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270665
reference_id 2270665
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270665
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
23
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
24
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
25
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
26
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
27
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
28
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
29
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
30
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
31
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
32
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
33
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
34
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
35
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
36
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
37
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
38
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
39
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1879444
reference_id show_bug.cgi?id=1879444
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1879444
41
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
42
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.9.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-2612
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b5y9-qmw5-nkbv
5
url VCID-g24d-23zk-6fgn
vulnerability_id VCID-g24d-23zk-6fgn
summary AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding() and AppendEncodedCharacters() could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2608.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2608
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36956
published_at 2026-04-02T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.3699
published_at 2026-04-04T12:55:00Z
2
value 0.0019
scoring_system epss
scoring_elements 0.40864
published_at 2026-04-13T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.40884
published_at 2026-04-12T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40877
published_at 2026-04-18T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40907
published_at 2026-04-16T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.40902
published_at 2026-04-09T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.40896
published_at 2026-04-08T12:55:00Z
8
value 0.0019
scoring_system epss
scoring_elements 0.40847
published_at 2026-04-07T12:55:00Z
9
value 0.0019
scoring_system epss
scoring_elements 0.40919
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2608
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270661
reference_id 2270661
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270661
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
23
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
24
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
25
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
26
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
27
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
28
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
29
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
30
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
31
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
32
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
33
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
34
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
35
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
36
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
37
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
38
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
39
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1880692
reference_id show_bug.cgi?id=1880692
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1880692
41
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
42
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.9.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-2608
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g24d-23zk-6fgn
6
url VCID-n8gb-hpjb-v7a5
vulnerability_id VCID-n8gb-hpjb-v7a5
summary Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2607.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2607
reference_id
reference_type
scores
0
value 0.01453
scoring_system epss
scoring_elements 0.80834
published_at 2026-04-18T12:55:00Z
1
value 0.01453
scoring_system epss
scoring_elements 0.80832
published_at 2026-04-16T12:55:00Z
2
value 0.01453
scoring_system epss
scoring_elements 0.80795
published_at 2026-04-13T12:55:00Z
3
value 0.01453
scoring_system epss
scoring_elements 0.80803
published_at 2026-04-12T12:55:00Z
4
value 0.01453
scoring_system epss
scoring_elements 0.80817
published_at 2026-04-11T12:55:00Z
5
value 0.01453
scoring_system epss
scoring_elements 0.80766
published_at 2026-04-04T12:55:00Z
6
value 0.01453
scoring_system epss
scoring_elements 0.80801
published_at 2026-04-09T12:55:00Z
7
value 0.01453
scoring_system epss
scoring_elements 0.80792
published_at 2026-04-08T12:55:00Z
8
value 0.01453
scoring_system epss
scoring_elements 0.80764
published_at 2026-04-07T12:55:00Z
9
value 0.01453
scoring_system epss
scoring_elements 0.80746
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2607
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270660
reference_id 2270660
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270660
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
23
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
24
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
25
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
26
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
27
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
28
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
29
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
30
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
31
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
32
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
33
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
34
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
35
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
36
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
37
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
38
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
39
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1879939
reference_id show_bug.cgi?id=1879939
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1879939
41
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
42
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.9.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-2607
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n8gb-hpjb-v7a5
7
url VCID-pse8-xnc7-gkbv
vulnerability_id VCID-pse8-xnc7-gkbv
summary Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2610.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2610.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2610
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39199
published_at 2026-04-02T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39221
published_at 2026-04-04T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.47018
published_at 2026-04-13T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.47011
published_at 2026-04-12T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.47069
published_at 2026-04-18T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.47074
published_at 2026-04-16T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.47038
published_at 2026-04-11T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.47013
published_at 2026-04-09T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.47016
published_at 2026-04-08T12:55:00Z
9
value 0.00239
scoring_system epss
scoring_elements 0.46961
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2610
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270663
reference_id 2270663
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270663
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
23
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
24
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
25
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
26
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
27
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
28
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
29
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
30
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
31
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
32
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
33
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
34
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
35
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
36
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
37
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
38
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
39
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1871112
reference_id show_bug.cgi?id=1871112
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1871112
41
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
42
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.9.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-2610
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pse8-xnc7-gkbv
8
url VCID-tjp3-ck7p-5qg3
vulnerability_id VCID-tjp3-ck7p-5qg3
summary An attacker could have leveraged the Windows Error Reporter to run arbitrary code on the system escaping the sandbox. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2605.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2605.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2605
reference_id
reference_type
scores
0
value 0.0032
scoring_system epss
scoring_elements 0.55125
published_at 2026-04-18T12:55:00Z
1
value 0.0032
scoring_system epss
scoring_elements 0.55084
published_at 2026-04-13T12:55:00Z
2
value 0.0032
scoring_system epss
scoring_elements 0.5506
published_at 2026-04-02T12:55:00Z
3
value 0.0032
scoring_system epss
scoring_elements 0.5511
published_at 2026-04-09T12:55:00Z
4
value 0.0032
scoring_system epss
scoring_elements 0.55061
published_at 2026-04-07T12:55:00Z
5
value 0.0032
scoring_system epss
scoring_elements 0.55085
published_at 2026-04-04T12:55:00Z
6
value 0.0032
scoring_system epss
scoring_elements 0.55102
published_at 2026-04-12T12:55:00Z
7
value 0.0032
scoring_system epss
scoring_elements 0.55122
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2605
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270659
reference_id 2270659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270659
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
5
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:48:39Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
7
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:48:39Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:48:39Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1872920
reference_id show_bug.cgi?id=1872920
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:48:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1872920
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.9.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-2605
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tjp3-ck7p-5qg3
9
url VCID-vcf2-b7mj-tfg4
vulnerability_id VCID-vcf2-b7mj-tfg4
summary To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2616.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2616.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2616
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12438
published_at 2026-04-18T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12512
published_at 2026-04-07T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12568
published_at 2026-04-12T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12609
published_at 2026-04-11T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12641
published_at 2026-04-09T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12658
published_at 2026-04-02T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.127
published_at 2026-04-04T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.1259
published_at 2026-04-08T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12433
published_at 2026-04-16T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12529
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2616
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270662
reference_id 2270662
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270662
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:53:47Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:53:47Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
18
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:53:47Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
19
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:53:47Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
20
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
21
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
22
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
23
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
24
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
25
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
26
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
27
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
28
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
29
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1846197
reference_id show_bug.cgi?id=1846197
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:53:47Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1846197
30
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@115.9.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.9.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-2616
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vcf2-b7mj-tfg4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.9.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community