Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
Typeapk
Namespacealpine
Namefirefox
Version70.0-r0
Qualifiers
arch x86_64
distroversion v3.16
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version71.0.1-r0
Latest_non_vulnerable_version101.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-b67z-91x3-sug1
vulnerability_id VCID-b67z-91x3-sug1
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11764.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11764.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11764
reference_id
reference_type
scores
0
value 0.00976
scoring_system epss
scoring_elements 0.76743
published_at 2026-04-16T12:55:00Z
1
value 0.00976
scoring_system epss
scoring_elements 0.7669
published_at 2026-04-08T12:55:00Z
2
value 0.00976
scoring_system epss
scoring_elements 0.76701
published_at 2026-04-09T12:55:00Z
3
value 0.00976
scoring_system epss
scoring_elements 0.7673
published_at 2026-04-11T12:55:00Z
4
value 0.00976
scoring_system epss
scoring_elements 0.7671
published_at 2026-04-12T12:55:00Z
5
value 0.00976
scoring_system epss
scoring_elements 0.76702
published_at 2026-04-13T12:55:00Z
6
value 0.00976
scoring_system epss
scoring_elements 0.76644
published_at 2026-04-01T12:55:00Z
7
value 0.00976
scoring_system epss
scoring_elements 0.76648
published_at 2026-04-02T12:55:00Z
8
value 0.00976
scoring_system epss
scoring_elements 0.76677
published_at 2026-04-04T12:55:00Z
9
value 0.00976
scoring_system epss
scoring_elements 0.76658
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11764
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764446
reference_id 1764446
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764446
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2019-11764
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b67z-91x3-sug1
1
url VCID-bae9-9f51-wqac
vulnerability_id VCID-bae9-9f51-wqac
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11760.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11760
reference_id
reference_type
scores
0
value 0.01522
scoring_system epss
scoring_elements 0.81292
published_at 2026-04-16T12:55:00Z
1
value 0.01522
scoring_system epss
scoring_elements 0.81252
published_at 2026-04-08T12:55:00Z
2
value 0.01522
scoring_system epss
scoring_elements 0.81257
published_at 2026-04-09T12:55:00Z
3
value 0.01522
scoring_system epss
scoring_elements 0.81277
published_at 2026-04-11T12:55:00Z
4
value 0.01522
scoring_system epss
scoring_elements 0.81263
published_at 2026-04-12T12:55:00Z
5
value 0.01522
scoring_system epss
scoring_elements 0.81256
published_at 2026-04-13T12:55:00Z
6
value 0.01522
scoring_system epss
scoring_elements 0.81192
published_at 2026-04-01T12:55:00Z
7
value 0.01522
scoring_system epss
scoring_elements 0.81201
published_at 2026-04-02T12:55:00Z
8
value 0.01522
scoring_system epss
scoring_elements 0.81224
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11760
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764441
reference_id 1764441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764441
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2019-11760
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bae9-9f51-wqac
2
url VCID-fxx3-xfat-m3bx
vulnerability_id VCID-fxx3-xfat-m3bx
summary An object tag with a data URI did not correctly inherit the document's Content Security Policy. This allowed a CSP bypass in a cross-origin frame if the document's policy explicitly allowed data: URIs.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17000
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37184
published_at 2026-04-16T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.371
published_at 2026-04-01T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37165
published_at 2026-04-12T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.37138
published_at 2026-04-13T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37267
published_at 2026-04-02T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37294
published_at 2026-04-04T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37123
published_at 2026-04-07T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37175
published_at 2026-04-08T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37189
published_at 2026-04-09T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37199
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17000
1
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
2
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
4
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
fixed_packages
0
url pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2019-17000
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fxx3-xfat-m3bx
3
url VCID-j64y-ejt3-tbe3
vulnerability_id VCID-j64y-ejt3-tbe3
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11757.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11757.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11757
reference_id
reference_type
scores
0
value 0.0139
scoring_system epss
scoring_elements 0.8038
published_at 2026-04-16T12:55:00Z
1
value 0.0139
scoring_system epss
scoring_elements 0.80343
published_at 2026-04-08T12:55:00Z
2
value 0.0139
scoring_system epss
scoring_elements 0.80354
published_at 2026-04-09T12:55:00Z
3
value 0.0139
scoring_system epss
scoring_elements 0.80372
published_at 2026-04-11T12:55:00Z
4
value 0.0139
scoring_system epss
scoring_elements 0.80357
published_at 2026-04-12T12:55:00Z
5
value 0.0139
scoring_system epss
scoring_elements 0.80351
published_at 2026-04-13T12:55:00Z
6
value 0.0139
scoring_system epss
scoring_elements 0.80298
published_at 2026-04-01T12:55:00Z
7
value 0.0139
scoring_system epss
scoring_elements 0.80306
published_at 2026-04-02T12:55:00Z
8
value 0.0139
scoring_system epss
scoring_elements 0.80326
published_at 2026-04-04T12:55:00Z
9
value 0.0139
scoring_system epss
scoring_elements 0.80314
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11757
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764438
reference_id 1764438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764438
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2019-11757
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j64y-ejt3-tbe3
4
url VCID-mnt3-q341-j7gj
vulnerability_id VCID-mnt3-q341-j7gj
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11763.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11763.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11763
reference_id
reference_type
scores
0
value 0.0223
scoring_system epss
scoring_elements 0.8455
published_at 2026-04-16T12:55:00Z
1
value 0.0223
scoring_system epss
scoring_elements 0.84514
published_at 2026-04-08T12:55:00Z
2
value 0.0223
scoring_system epss
scoring_elements 0.8452
published_at 2026-04-09T12:55:00Z
3
value 0.0223
scoring_system epss
scoring_elements 0.84539
published_at 2026-04-11T12:55:00Z
4
value 0.0223
scoring_system epss
scoring_elements 0.84534
published_at 2026-04-12T12:55:00Z
5
value 0.0223
scoring_system epss
scoring_elements 0.8453
published_at 2026-04-13T12:55:00Z
6
value 0.0223
scoring_system epss
scoring_elements 0.84456
published_at 2026-04-01T12:55:00Z
7
value 0.0223
scoring_system epss
scoring_elements 0.84472
published_at 2026-04-02T12:55:00Z
8
value 0.0223
scoring_system epss
scoring_elements 0.84491
published_at 2026-04-04T12:55:00Z
9
value 0.0223
scoring_system epss
scoring_elements 0.84493
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11763
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764444
reference_id 1764444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764444
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2019-11763
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mnt3-q341-j7gj
5
url VCID-nbvc-j1zu-v7d8
vulnerability_id VCID-nbvc-j1zu-v7d8
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11762.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11762.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11762
reference_id
reference_type
scores
0
value 0.00379
scoring_system epss
scoring_elements 0.59428
published_at 2026-04-16T12:55:00Z
1
value 0.00379
scoring_system epss
scoring_elements 0.59399
published_at 2026-04-08T12:55:00Z
2
value 0.00379
scoring_system epss
scoring_elements 0.59413
published_at 2026-04-09T12:55:00Z
3
value 0.00379
scoring_system epss
scoring_elements 0.59432
published_at 2026-04-11T12:55:00Z
4
value 0.00379
scoring_system epss
scoring_elements 0.59415
published_at 2026-04-12T12:55:00Z
5
value 0.00379
scoring_system epss
scoring_elements 0.59397
published_at 2026-04-13T12:55:00Z
6
value 0.00379
scoring_system epss
scoring_elements 0.59284
published_at 2026-04-01T12:55:00Z
7
value 0.00379
scoring_system epss
scoring_elements 0.59358
published_at 2026-04-02T12:55:00Z
8
value 0.00379
scoring_system epss
scoring_elements 0.59382
published_at 2026-04-04T12:55:00Z
9
value 0.00379
scoring_system epss
scoring_elements 0.59348
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11762
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764443
reference_id 1764443
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764443
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2019-11762
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nbvc-j1zu-v7d8
6
url VCID-nguh-j845-wbf1
vulnerability_id VCID-nguh-j845-wbf1
summary A Content-Security-Policy that blocks in-line scripts could be bypassed using an object tag to execute JavaScript in the protected document (cross-site scripting). This is a separate bypass from CVE-2019-17000.*Note: This flaw only affected Firefox 69 and was not present in earlier versions.*
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17001
reference_id
reference_type
scores
0
value 0.00221
scoring_system epss
scoring_elements 0.44784
published_at 2026-04-16T12:55:00Z
1
value 0.00221
scoring_system epss
scoring_elements 0.44648
published_at 2026-04-01T12:55:00Z
2
value 0.00221
scoring_system epss
scoring_elements 0.44727
published_at 2026-04-12T12:55:00Z
3
value 0.00221
scoring_system epss
scoring_elements 0.44729
published_at 2026-04-13T12:55:00Z
4
value 0.00221
scoring_system epss
scoring_elements 0.44728
published_at 2026-04-02T12:55:00Z
5
value 0.00221
scoring_system epss
scoring_elements 0.44749
published_at 2026-04-04T12:55:00Z
6
value 0.00221
scoring_system epss
scoring_elements 0.44687
published_at 2026-04-07T12:55:00Z
7
value 0.00221
scoring_system epss
scoring_elements 0.4474
published_at 2026-04-08T12:55:00Z
8
value 0.00221
scoring_system epss
scoring_elements 0.44743
published_at 2026-04-09T12:55:00Z
9
value 0.00221
scoring_system epss
scoring_elements 0.44759
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17001
1
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
2
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
4
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
fixed_packages
0
url pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2019-17001
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nguh-j845-wbf1
7
url VCID-nmh4-zpeh-4bcr
vulnerability_id VCID-nmh4-zpeh-4bcr
summary
Multiple vulnerabilities have been found in Expat, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
12
reference_url http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
13
reference_url http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
14
reference_url http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
15
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15903.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15903.json
16
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15903
reference_id
reference_type
scores
0
value 0.00198
scoring_system epss
scoring_elements 0.41858
published_at 2026-04-02T12:55:00Z
1
value 0.00198
scoring_system epss
scoring_elements 0.41902
published_at 2026-04-16T12:55:00Z
2
value 0.00198
scoring_system epss
scoring_elements 0.41852
published_at 2026-04-13T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.41865
published_at 2026-04-12T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.419
published_at 2026-04-11T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41793
published_at 2026-04-01T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41876
published_at 2026-04-09T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.41866
published_at 2026-04-08T12:55:00Z
8
value 0.00198
scoring_system epss
scoring_elements 0.41816
published_at 2026-04-07T12:55:00Z
9
value 0.00198
scoring_system epss
scoring_elements 0.41888
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15903
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
26
reference_url http://seclists.org/fulldisclosure/2019/Dec/23
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://seclists.org/fulldisclosure/2019/Dec/23
27
reference_url http://seclists.org/fulldisclosure/2019/Dec/26
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://seclists.org/fulldisclosure/2019/Dec/26
28
reference_url http://seclists.org/fulldisclosure/2019/Dec/27
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://seclists.org/fulldisclosure/2019/Dec/27
29
reference_url http://seclists.org/fulldisclosure/2019/Dec/30
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url http://seclists.org/fulldisclosure/2019/Dec/30
30
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
31
reference_url https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
32
reference_url https://github.com/libexpat/libexpat/issues/317
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://github.com/libexpat/libexpat/issues/317
33
reference_url https://github.com/libexpat/libexpat/issues/342
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://github.com/libexpat/libexpat/issues/342
34
reference_url https://github.com/libexpat/libexpat/pull/318
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://github.com/libexpat/libexpat/pull/318
35
reference_url https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html
36
reference_url https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html
37
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/
38
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/
39
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/
40
reference_url https://seclists.org/bugtraq/2019/Dec/17
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://seclists.org/bugtraq/2019/Dec/17
41
reference_url https://seclists.org/bugtraq/2019/Dec/21
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://seclists.org/bugtraq/2019/Dec/21
42
reference_url https://seclists.org/bugtraq/2019/Dec/23
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://seclists.org/bugtraq/2019/Dec/23
43
reference_url https://seclists.org/bugtraq/2019/Nov/1
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://seclists.org/bugtraq/2019/Nov/1
44
reference_url https://seclists.org/bugtraq/2019/Nov/24
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://seclists.org/bugtraq/2019/Nov/24
45
reference_url https://seclists.org/bugtraq/2019/Oct/29
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://seclists.org/bugtraq/2019/Oct/29
46
reference_url https://seclists.org/bugtraq/2019/Sep/30
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://seclists.org/bugtraq/2019/Sep/30
47
reference_url https://seclists.org/bugtraq/2019/Sep/37
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://seclists.org/bugtraq/2019/Sep/37
48
reference_url https://security.netapp.com/advisory/ntap-20190926-0004/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://security.netapp.com/advisory/ntap-20190926-0004/
49
reference_url https://support.apple.com/kb/HT210785
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://support.apple.com/kb/HT210785
50
reference_url https://support.apple.com/kb/HT210788
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://support.apple.com/kb/HT210788
51
reference_url https://support.apple.com/kb/HT210789
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://support.apple.com/kb/HT210789
52
reference_url https://support.apple.com/kb/HT210790
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://support.apple.com/kb/HT210790
53
reference_url https://support.apple.com/kb/HT210793
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://support.apple.com/kb/HT210793
54
reference_url https://support.apple.com/kb/HT210794
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://support.apple.com/kb/HT210794
55
reference_url https://support.apple.com/kb/HT210795
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://support.apple.com/kb/HT210795
56
reference_url https://www.debian.org/security/2019/dsa-4530
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://www.debian.org/security/2019/dsa-4530
57
reference_url https://www.debian.org/security/2019/dsa-4549
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://www.debian.org/security/2019/dsa-4549
58
reference_url https://www.debian.org/security/2019/dsa-4571
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://www.debian.org/security/2019/dsa-4571
59
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
60
reference_url https://www.oracle.com/security-alerts/cpuoct2020.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://www.oracle.com/security-alerts/cpuoct2020.html
61
reference_url https://www.tenable.com/security/tns-2021-11
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://www.tenable.com/security/tns-2021-11
62
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1752592
reference_id 1752592
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1752592
63
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939394
reference_id 939394
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939394
64
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
65
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
66
reference_url https://security.archlinux.org/ASA-201910-17
reference_id ASA-201910-17
reference_type
scores
url https://security.archlinux.org/ASA-201910-17
67
reference_url https://security.archlinux.org/AVG-1053
reference_id AVG-1053
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1053
68
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
69
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15903
reference_id CVE-2019-15903
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15903
73
reference_url https://security.gentoo.org/glsa/201911-08
reference_id GLSA-201911-08
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://security.gentoo.org/glsa/201911-08
74
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
75
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
76
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
77
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
78
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
79
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://access.redhat.com/errata/RHSA-2019:3210
80
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://access.redhat.com/errata/RHSA-2019:3237
81
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://access.redhat.com/errata/RHSA-2019:3756
82
reference_url https://access.redhat.com/errata/RHSA-2020:2644
reference_id RHSA-2020:2644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2644
83
reference_url https://access.redhat.com/errata/RHSA-2020:2646
reference_id RHSA-2020:2646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2646
84
reference_url https://access.redhat.com/errata/RHSA-2020:3952
reference_id RHSA-2020:3952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3952
85
reference_url https://access.redhat.com/errata/RHSA-2020:4484
reference_id RHSA-2020:4484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4484
86
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
87
reference_url https://access.redhat.com/errata/RHSA-2025:22871
reference_id RHSA-2025:22871
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22871
88
reference_url https://usn.ubuntu.com/4132-1/
reference_id USN-4132-1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://usn.ubuntu.com/4132-1/
89
reference_url https://usn.ubuntu.com/4132-2/
reference_id USN-4132-2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://usn.ubuntu.com/4132-2/
90
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://usn.ubuntu.com/4165-1/
91
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://usn.ubuntu.com/4202-1/
92
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:27:14Z/
url https://usn.ubuntu.com/4335-1/
93
reference_url https://usn.ubuntu.com/7199-1/
reference_id USN-7199-1
reference_type
scores
url https://usn.ubuntu.com/7199-1/
94
reference_url https://usn.ubuntu.com/USN-4852-1/
reference_id USN-USN-4852-1
reference_type
scores
url https://usn.ubuntu.com/USN-4852-1/
95
reference_url https://usn.ubuntu.com/USN-5455-1/
reference_id USN-USN-5455-1
reference_type
scores
url https://usn.ubuntu.com/USN-5455-1/
fixed_packages
0
url pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2019-15903
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nmh4-zpeh-4bcr
8
url VCID-pzwg-wv7w-s7fv
vulnerability_id VCID-pzwg-wv7w-s7fv
summary If upgrade-insecure-requests was specified in the Content Security Policy, and a link was dragged and dropped from that page, the link was not upgraded to https.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17002
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51852
published_at 2026-04-16T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.51707
published_at 2026-04-01T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.51824
published_at 2026-04-12T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51809
published_at 2026-04-13T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.51756
published_at 2026-04-02T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.51782
published_at 2026-04-04T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51742
published_at 2026-04-07T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51797
published_at 2026-04-08T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51794
published_at 2026-04-09T12:55:00Z
9
value 0.00284
scoring_system epss
scoring_elements 0.51845
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17002
1
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
2
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
4
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
fixed_packages
0
url pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2019-17002
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pzwg-wv7w-s7fv
9
url VCID-rhwa-2ash-jkgh
vulnerability_id VCID-rhwa-2ash-jkgh
summary A compromised content process could send a message to the parent process that would cause the 'Click to Play' permission prompt to be shown. However, due to lack of validation from the parent process, if the user accepted the permission request an attacker-controlled permission would be granted rather than the 'Click to Play' permission.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11765
reference_id
reference_type
scores
0
value 0.00309
scoring_system epss
scoring_elements 0.54118
published_at 2026-04-16T12:55:00Z
1
value 0.00309
scoring_system epss
scoring_elements 0.53994
published_at 2026-04-01T12:55:00Z
2
value 0.00309
scoring_system epss
scoring_elements 0.54095
published_at 2026-04-12T12:55:00Z
3
value 0.00309
scoring_system epss
scoring_elements 0.54078
published_at 2026-04-13T12:55:00Z
4
value 0.00309
scoring_system epss
scoring_elements 0.54012
published_at 2026-04-02T12:55:00Z
5
value 0.00309
scoring_system epss
scoring_elements 0.54038
published_at 2026-04-04T12:55:00Z
6
value 0.00309
scoring_system epss
scoring_elements 0.54015
published_at 2026-04-07T12:55:00Z
7
value 0.00309
scoring_system epss
scoring_elements 0.54066
published_at 2026-04-09T12:55:00Z
8
value 0.00309
scoring_system epss
scoring_elements 0.54113
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11765
1
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
2
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
4
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
fixed_packages
0
url pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2019-11765
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rhwa-2ash-jkgh
10
url VCID-tvsp-tsfk-v7eg
vulnerability_id VCID-tvsp-tsfk-v7eg
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11759.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11759.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11759
reference_id
reference_type
scores
0
value 0.0251
scoring_system epss
scoring_elements 0.85387
published_at 2026-04-16T12:55:00Z
1
value 0.0251
scoring_system epss
scoring_elements 0.85351
published_at 2026-04-08T12:55:00Z
2
value 0.0251
scoring_system epss
scoring_elements 0.85359
published_at 2026-04-09T12:55:00Z
3
value 0.0251
scoring_system epss
scoring_elements 0.85373
published_at 2026-04-11T12:55:00Z
4
value 0.0251
scoring_system epss
scoring_elements 0.85371
published_at 2026-04-12T12:55:00Z
5
value 0.0251
scoring_system epss
scoring_elements 0.85368
published_at 2026-04-13T12:55:00Z
6
value 0.0251
scoring_system epss
scoring_elements 0.85296
published_at 2026-04-01T12:55:00Z
7
value 0.0251
scoring_system epss
scoring_elements 0.85309
published_at 2026-04-02T12:55:00Z
8
value 0.0251
scoring_system epss
scoring_elements 0.85327
published_at 2026-04-04T12:55:00Z
9
value 0.0251
scoring_system epss
scoring_elements 0.85329
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11759
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764440
reference_id 1764440
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764440
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2019-11759
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvsp-tsfk-v7eg
11
url VCID-vkpn-uuym-qkge
vulnerability_id VCID-vkpn-uuym-qkge
summary
Multiple vulnerabilities have been found in Chromium and Google
    Chrome, the worst of which allows remote attackers to escalate privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6156.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6156.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6156
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.69823
published_at 2026-04-16T12:55:00Z
1
value 0.00611
scoring_system epss
scoring_elements 0.69782
published_at 2026-04-13T12:55:00Z
2
value 0.00611
scoring_system epss
scoring_elements 0.69797
published_at 2026-04-12T12:55:00Z
3
value 0.00623
scoring_system epss
scoring_elements 0.70113
published_at 2026-04-08T12:55:00Z
4
value 0.00623
scoring_system epss
scoring_elements 0.70129
published_at 2026-04-09T12:55:00Z
5
value 0.00623
scoring_system epss
scoring_elements 0.70153
published_at 2026-04-11T12:55:00Z
6
value 0.00623
scoring_system epss
scoring_elements 0.70066
published_at 2026-04-07T12:55:00Z
7
value 0.00623
scoring_system epss
scoring_elements 0.70061
published_at 2026-04-01T12:55:00Z
8
value 0.00623
scoring_system epss
scoring_elements 0.70074
published_at 2026-04-02T12:55:00Z
9
value 0.00623
scoring_system epss
scoring_elements 0.70089
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6156
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16064
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17460
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17461
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4117
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4117
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6150
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6151
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6152
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6153
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6154
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6155
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6156
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6157
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6157
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6158
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6159
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6159
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6161
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6162
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6163
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6164
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6165
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6166
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6167
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6168
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6169
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6170
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6170
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6171
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6172
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6172
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6173
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6174
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6175
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6176
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6177
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6178
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6179
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1608180
reference_id 1608180
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1608180
36
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
37
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
38
reference_url https://security.gentoo.org/glsa/201808-01
reference_id GLSA-201808-01
reference_type
scores
url https://security.gentoo.org/glsa/201808-01
39
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
40
reference_url https://access.redhat.com/errata/RHSA-2018:2282
reference_id RHSA-2018:2282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2282
41
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
fixed_packages
0
url pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2018-6156
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vkpn-uuym-qkge
12
url VCID-wpvp-c7aw-qfhw
vulnerability_id VCID-wpvp-c7aw-qfhw
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11761.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11761
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63283
published_at 2026-04-13T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.6325
published_at 2026-04-07T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63301
published_at 2026-04-08T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63319
published_at 2026-04-09T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63336
published_at 2026-04-11T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.6332
published_at 2026-04-16T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63196
published_at 2026-04-01T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63256
published_at 2026-04-02T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63285
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764442
reference_id 1764442
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764442
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@70.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2019-11761
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpvp-c7aw-qfhw
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@70.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community