Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
Typeapk
Namespacealpine
Namethunderbird
Version128.5.0-r0
Qualifiers
arch ppc64le
distroversion v3.22
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5j6z-g7gt-qyea
vulnerability_id VCID-5j6z-g7gt-qyea
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11694.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11694
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32663
published_at 2026-04-16T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32759
published_at 2026-04-02T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32795
published_at 2026-04-04T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32616
published_at 2026-04-07T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32691
published_at 2026-04-11T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32653
published_at 2026-04-12T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32689
published_at 2026-04-09T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32664
published_at 2026-04-08T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32625
published_at 2026-04-13T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39421
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11694
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328941
reference_id 2328941
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328941
5
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
6
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
7
reference_url https://security.gentoo.org/glsa/202509-02
reference_id GLSA-202509-02
reference_type
scores
url https://security.gentoo.org/glsa/202509-02
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
reference_id mfsa2024-63
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-63/
reference_id mfsa2024-63
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-63/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
reference_id mfsa2024-64
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-64/
reference_id mfsa2024-64
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-64/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-65
reference_id mfsa2024-65
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-65
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-65/
reference_id mfsa2024-65
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-65/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
reference_id mfsa2024-67
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-67/
reference_id mfsa2024-67
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-67/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
reference_id mfsa2024-68
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-68/
reference_id mfsa2024-68
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-68/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-70
reference_id mfsa2024-70
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-70
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-70/
reference_id mfsa2024-70
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-70/
20
reference_url https://access.redhat.com/errata/RHSA-2024:10591
reference_id RHSA-2024:10591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10591
21
reference_url https://access.redhat.com/errata/RHSA-2024:10592
reference_id RHSA-2024:10592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10592
22
reference_url https://access.redhat.com/errata/RHSA-2024:10667
reference_id RHSA-2024:10667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10667
23
reference_url https://access.redhat.com/errata/RHSA-2024:10702
reference_id RHSA-2024:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10702
24
reference_url https://access.redhat.com/errata/RHSA-2024:10703
reference_id RHSA-2024:10703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10703
25
reference_url https://access.redhat.com/errata/RHSA-2024:10704
reference_id RHSA-2024:10704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10704
26
reference_url https://access.redhat.com/errata/RHSA-2024:10710
reference_id RHSA-2024:10710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10710
27
reference_url https://access.redhat.com/errata/RHSA-2024:10733
reference_id RHSA-2024:10733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10733
28
reference_url https://access.redhat.com/errata/RHSA-2024:10734
reference_id RHSA-2024:10734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10734
29
reference_url https://access.redhat.com/errata/RHSA-2024:10742
reference_id RHSA-2024:10742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10742
30
reference_url https://access.redhat.com/errata/RHSA-2024:10743
reference_id RHSA-2024:10743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10743
31
reference_url https://access.redhat.com/errata/RHSA-2024:10745
reference_id RHSA-2024:10745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10745
32
reference_url https://access.redhat.com/errata/RHSA-2024:10748
reference_id RHSA-2024:10748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10748
33
reference_url https://access.redhat.com/errata/RHSA-2024:10752
reference_id RHSA-2024:10752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10752
34
reference_url https://access.redhat.com/errata/RHSA-2024:10844
reference_id RHSA-2024:10844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10844
35
reference_url https://access.redhat.com/errata/RHSA-2024:10848
reference_id RHSA-2024:10848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10848
36
reference_url https://access.redhat.com/errata/RHSA-2024:10849
reference_id RHSA-2024:10849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10849
37
reference_url https://access.redhat.com/errata/RHSA-2024:10880
reference_id RHSA-2024:10880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10880
38
reference_url https://access.redhat.com/errata/RHSA-2024:10881
reference_id RHSA-2024:10881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10881
39
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1924167
reference_id show_bug.cgi?id=1924167
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1924167
40
reference_url https://usn.ubuntu.com/7134-1/
reference_id USN-7134-1
reference_type
scores
url https://usn.ubuntu.com/7134-1/
41
reference_url https://usn.ubuntu.com/7193-1/
reference_id USN-7193-1
reference_type
scores
url https://usn.ubuntu.com/7193-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@128.5.0-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community
aliases CVE-2024-11694
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5j6z-g7gt-qyea
1
url VCID-7u5b-uzd5-7kdc
vulnerability_id VCID-7u5b-uzd5-7kdc
summary Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. *This bug only affected the application on Apple M series hardware. Other platforms were unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11691.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11691
reference_id
reference_type
scores
0
value 0.00161
scoring_system epss
scoring_elements 0.37063
published_at 2026-04-16T12:55:00Z
1
value 0.00161
scoring_system epss
scoring_elements 0.37143
published_at 2026-04-02T12:55:00Z
2
value 0.00161
scoring_system epss
scoring_elements 0.37175
published_at 2026-04-04T12:55:00Z
3
value 0.00161
scoring_system epss
scoring_elements 0.37005
published_at 2026-04-07T12:55:00Z
4
value 0.00161
scoring_system epss
scoring_elements 0.37044
published_at 2026-04-12T12:55:00Z
5
value 0.00161
scoring_system epss
scoring_elements 0.37069
published_at 2026-04-09T12:55:00Z
6
value 0.00161
scoring_system epss
scoring_elements 0.37017
published_at 2026-04-13T12:55:00Z
7
value 0.00161
scoring_system epss
scoring_elements 0.37078
published_at 2026-04-11T12:55:00Z
8
value 0.00161
scoring_system epss
scoring_elements 0.37056
published_at 2026-04-08T12:55:00Z
9
value 0.00219
scoring_system epss
scoring_elements 0.44625
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11691
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328940
reference_id 2328940
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328940
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
reference_id mfsa2024-63
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
5
reference_url https://www.mozilla.org/security/advisories/mfsa2024-63/
reference_id mfsa2024-63
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-63/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
reference_id mfsa2024-64
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
7
reference_url https://www.mozilla.org/security/advisories/mfsa2024-64/
reference_id mfsa2024-64
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-64/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-65
reference_id mfsa2024-65
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-65
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-65/
reference_id mfsa2024-65
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-65/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
reference_id mfsa2024-67
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-67/
reference_id mfsa2024-67
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-67/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
reference_id mfsa2024-68
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-68/
reference_id mfsa2024-68
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-68/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-70
reference_id mfsa2024-70
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-70
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-70/
reference_id mfsa2024-70
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-70/
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1914707
reference_id show_bug.cgi?id=1914707
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1914707
17
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1924184
reference_id show_bug.cgi?id=1924184
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1924184
fixed_packages
0
url pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@128.5.0-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community
aliases CVE-2024-11691
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7u5b-uzd5-7kdc
2
url VCID-8k4z-rq29-mqg5
vulnerability_id VCID-8k4z-rq29-mqg5
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11697.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11697.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11697
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.22135
published_at 2026-04-02T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22081
published_at 2026-04-12T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22122
published_at 2026-04-11T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22104
published_at 2026-04-09T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22048
published_at 2026-04-08T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21968
published_at 2026-04-07T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22184
published_at 2026-04-04T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22018
published_at 2026-04-16T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.2202
published_at 2026-04-13T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26995
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11697
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11697
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328950
reference_id 2328950
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328950
5
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
6
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
7
reference_url https://security.gentoo.org/glsa/202509-02
reference_id GLSA-202509-02
reference_type
scores
url https://security.gentoo.org/glsa/202509-02
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
reference_id mfsa2024-63
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-63/
reference_id mfsa2024-63
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/
url https://www.mozilla.org/security/advisories/mfsa2024-63/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
reference_id mfsa2024-64
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-64/
reference_id mfsa2024-64
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/
url https://www.mozilla.org/security/advisories/mfsa2024-64/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
reference_id mfsa2024-67
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-67/
reference_id mfsa2024-67
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/
url https://www.mozilla.org/security/advisories/mfsa2024-67/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
reference_id mfsa2024-68
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-68/
reference_id mfsa2024-68
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/
url https://www.mozilla.org/security/advisories/mfsa2024-68/
16
reference_url https://access.redhat.com/errata/RHSA-2024:10591
reference_id RHSA-2024:10591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10591
17
reference_url https://access.redhat.com/errata/RHSA-2024:10592
reference_id RHSA-2024:10592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10592
18
reference_url https://access.redhat.com/errata/RHSA-2024:10667
reference_id RHSA-2024:10667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10667
19
reference_url https://access.redhat.com/errata/RHSA-2024:10702
reference_id RHSA-2024:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10702
20
reference_url https://access.redhat.com/errata/RHSA-2024:10703
reference_id RHSA-2024:10703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10703
21
reference_url https://access.redhat.com/errata/RHSA-2024:10704
reference_id RHSA-2024:10704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10704
22
reference_url https://access.redhat.com/errata/RHSA-2024:10710
reference_id RHSA-2024:10710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10710
23
reference_url https://access.redhat.com/errata/RHSA-2024:10733
reference_id RHSA-2024:10733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10733
24
reference_url https://access.redhat.com/errata/RHSA-2024:10734
reference_id RHSA-2024:10734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10734
25
reference_url https://access.redhat.com/errata/RHSA-2024:10742
reference_id RHSA-2024:10742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10742
26
reference_url https://access.redhat.com/errata/RHSA-2024:10743
reference_id RHSA-2024:10743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10743
27
reference_url https://access.redhat.com/errata/RHSA-2024:10745
reference_id RHSA-2024:10745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10745
28
reference_url https://access.redhat.com/errata/RHSA-2024:10748
reference_id RHSA-2024:10748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10748
29
reference_url https://access.redhat.com/errata/RHSA-2024:10752
reference_id RHSA-2024:10752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10752
30
reference_url https://access.redhat.com/errata/RHSA-2024:10844
reference_id RHSA-2024:10844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10844
31
reference_url https://access.redhat.com/errata/RHSA-2024:10848
reference_id RHSA-2024:10848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10848
32
reference_url https://access.redhat.com/errata/RHSA-2024:10849
reference_id RHSA-2024:10849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10849
33
reference_url https://access.redhat.com/errata/RHSA-2024:10880
reference_id RHSA-2024:10880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10880
34
reference_url https://access.redhat.com/errata/RHSA-2024:10881
reference_id RHSA-2024:10881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10881
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1842187
reference_id show_bug.cgi?id=1842187
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1842187
36
reference_url https://usn.ubuntu.com/7134-1/
reference_id USN-7134-1
reference_type
scores
url https://usn.ubuntu.com/7134-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@128.5.0-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community
aliases CVE-2024-11697
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8k4z-rq29-mqg5
3
url VCID-bjny-apx2-8ba1
vulnerability_id VCID-bjny-apx2-8ba1
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11695.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11695
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.32591
published_at 2026-04-02T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.32492
published_at 2026-04-12T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.3253
published_at 2026-04-11T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32526
published_at 2026-04-09T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.32498
published_at 2026-04-08T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.3245
published_at 2026-04-07T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.32627
published_at 2026-04-04T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32501
published_at 2026-04-16T12:55:00Z
8
value 0.0013
scoring_system epss
scoring_elements 0.32466
published_at 2026-04-13T12:55:00Z
9
value 0.00177
scoring_system epss
scoring_elements 0.39232
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11695
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328948
reference_id 2328948
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328948
5
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
6
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
7
reference_url https://security.gentoo.org/glsa/202509-02
reference_id GLSA-202509-02
reference_type
scores
url https://security.gentoo.org/glsa/202509-02
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
reference_id mfsa2024-63
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-63/
reference_id mfsa2024-63
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-63/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
reference_id mfsa2024-64
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-64/
reference_id mfsa2024-64
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-64/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
reference_id mfsa2024-67
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-67/
reference_id mfsa2024-67
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-67/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
reference_id mfsa2024-68
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-68/
reference_id mfsa2024-68
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-68/
16
reference_url https://access.redhat.com/errata/RHSA-2024:10591
reference_id RHSA-2024:10591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10591
17
reference_url https://access.redhat.com/errata/RHSA-2024:10592
reference_id RHSA-2024:10592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10592
18
reference_url https://access.redhat.com/errata/RHSA-2024:10667
reference_id RHSA-2024:10667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10667
19
reference_url https://access.redhat.com/errata/RHSA-2024:10702
reference_id RHSA-2024:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10702
20
reference_url https://access.redhat.com/errata/RHSA-2024:10703
reference_id RHSA-2024:10703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10703
21
reference_url https://access.redhat.com/errata/RHSA-2024:10704
reference_id RHSA-2024:10704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10704
22
reference_url https://access.redhat.com/errata/RHSA-2024:10710
reference_id RHSA-2024:10710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10710
23
reference_url https://access.redhat.com/errata/RHSA-2024:10733
reference_id RHSA-2024:10733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10733
24
reference_url https://access.redhat.com/errata/RHSA-2024:10734
reference_id RHSA-2024:10734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10734
25
reference_url https://access.redhat.com/errata/RHSA-2024:10742
reference_id RHSA-2024:10742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10742
26
reference_url https://access.redhat.com/errata/RHSA-2024:10743
reference_id RHSA-2024:10743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10743
27
reference_url https://access.redhat.com/errata/RHSA-2024:10745
reference_id RHSA-2024:10745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10745
28
reference_url https://access.redhat.com/errata/RHSA-2024:10748
reference_id RHSA-2024:10748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10748
29
reference_url https://access.redhat.com/errata/RHSA-2024:10752
reference_id RHSA-2024:10752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10752
30
reference_url https://access.redhat.com/errata/RHSA-2024:10844
reference_id RHSA-2024:10844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10844
31
reference_url https://access.redhat.com/errata/RHSA-2024:10848
reference_id RHSA-2024:10848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10848
32
reference_url https://access.redhat.com/errata/RHSA-2024:10849
reference_id RHSA-2024:10849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10849
33
reference_url https://access.redhat.com/errata/RHSA-2024:10880
reference_id RHSA-2024:10880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10880
34
reference_url https://access.redhat.com/errata/RHSA-2024:10881
reference_id RHSA-2024:10881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10881
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1925496
reference_id show_bug.cgi?id=1925496
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1925496
36
reference_url https://usn.ubuntu.com/7134-1/
reference_id USN-7134-1
reference_type
scores
url https://usn.ubuntu.com/7134-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@128.5.0-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community
aliases CVE-2024-11695
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bjny-apx2-8ba1
4
url VCID-dh5k-q87q-4qfs
vulnerability_id VCID-dh5k-q87q-4qfs
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11696.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11696
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13839
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13762
published_at 2026-04-12T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13799
published_at 2026-04-11T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13831
published_at 2026-04-09T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.1378
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13698
published_at 2026-04-07T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13896
published_at 2026-04-04T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13625
published_at 2026-04-16T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13713
published_at 2026-04-13T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.18978
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11696
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11696
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328943
reference_id 2328943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328943
5
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
6
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
7
reference_url https://security.gentoo.org/glsa/202509-02
reference_id GLSA-202509-02
reference_type
scores
url https://security.gentoo.org/glsa/202509-02
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
reference_id mfsa2024-63
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-63/
reference_id mfsa2024-63
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-63/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
reference_id mfsa2024-64
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-64/
reference_id mfsa2024-64
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-64/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
reference_id mfsa2024-67
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-67/
reference_id mfsa2024-67
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-67/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
reference_id mfsa2024-68
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-68/
reference_id mfsa2024-68
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-68/
16
reference_url https://access.redhat.com/errata/RHSA-2024:10591
reference_id RHSA-2024:10591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10591
17
reference_url https://access.redhat.com/errata/RHSA-2024:10592
reference_id RHSA-2024:10592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10592
18
reference_url https://access.redhat.com/errata/RHSA-2024:10667
reference_id RHSA-2024:10667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10667
19
reference_url https://access.redhat.com/errata/RHSA-2024:10702
reference_id RHSA-2024:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10702
20
reference_url https://access.redhat.com/errata/RHSA-2024:10703
reference_id RHSA-2024:10703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10703
21
reference_url https://access.redhat.com/errata/RHSA-2024:10704
reference_id RHSA-2024:10704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10704
22
reference_url https://access.redhat.com/errata/RHSA-2024:10710
reference_id RHSA-2024:10710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10710
23
reference_url https://access.redhat.com/errata/RHSA-2024:10733
reference_id RHSA-2024:10733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10733
24
reference_url https://access.redhat.com/errata/RHSA-2024:10734
reference_id RHSA-2024:10734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10734
25
reference_url https://access.redhat.com/errata/RHSA-2024:10742
reference_id RHSA-2024:10742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10742
26
reference_url https://access.redhat.com/errata/RHSA-2024:10743
reference_id RHSA-2024:10743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10743
27
reference_url https://access.redhat.com/errata/RHSA-2024:10745
reference_id RHSA-2024:10745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10745
28
reference_url https://access.redhat.com/errata/RHSA-2024:10748
reference_id RHSA-2024:10748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10748
29
reference_url https://access.redhat.com/errata/RHSA-2024:10752
reference_id RHSA-2024:10752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10752
30
reference_url https://access.redhat.com/errata/RHSA-2024:10844
reference_id RHSA-2024:10844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10844
31
reference_url https://access.redhat.com/errata/RHSA-2024:10848
reference_id RHSA-2024:10848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10848
32
reference_url https://access.redhat.com/errata/RHSA-2024:10849
reference_id RHSA-2024:10849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10849
33
reference_url https://access.redhat.com/errata/RHSA-2024:10880
reference_id RHSA-2024:10880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10880
34
reference_url https://access.redhat.com/errata/RHSA-2024:10881
reference_id RHSA-2024:10881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10881
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1929600
reference_id show_bug.cgi?id=1929600
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1929600
36
reference_url https://usn.ubuntu.com/7134-1/
reference_id USN-7134-1
reference_type
scores
url https://usn.ubuntu.com/7134-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@128.5.0-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community
aliases CVE-2024-11696
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dh5k-q87q-4qfs
5
url VCID-f4ja-2ydw-cufu
vulnerability_id VCID-f4ja-2ydw-cufu
summary The executable file warning was not presented when downloading .library-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11693.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11693.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11693
reference_id
reference_type
scores
0
value 0.0029
scoring_system epss
scoring_elements 0.52339
published_at 2026-04-02T12:55:00Z
1
value 0.0029
scoring_system epss
scoring_elements 0.52415
published_at 2026-04-12T12:55:00Z
2
value 0.0029
scoring_system epss
scoring_elements 0.52431
published_at 2026-04-11T12:55:00Z
3
value 0.0029
scoring_system epss
scoring_elements 0.52381
published_at 2026-04-09T12:55:00Z
4
value 0.0029
scoring_system epss
scoring_elements 0.52386
published_at 2026-04-08T12:55:00Z
5
value 0.0029
scoring_system epss
scoring_elements 0.52333
published_at 2026-04-07T12:55:00Z
6
value 0.0029
scoring_system epss
scoring_elements 0.52367
published_at 2026-04-04T12:55:00Z
7
value 0.0029
scoring_system epss
scoring_elements 0.52441
published_at 2026-04-16T12:55:00Z
8
value 0.0029
scoring_system epss
scoring_elements 0.52402
published_at 2026-04-13T12:55:00Z
9
value 0.00393
scoring_system epss
scoring_elements 0.60327
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11693
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328949
reference_id 2328949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328949
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
reference_id mfsa2024-63
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
5
reference_url https://www.mozilla.org/security/advisories/mfsa2024-63/
reference_id mfsa2024-63
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:32:54Z/
url https://www.mozilla.org/security/advisories/mfsa2024-63/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
reference_id mfsa2024-64
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
7
reference_url https://www.mozilla.org/security/advisories/mfsa2024-64/
reference_id mfsa2024-64
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:32:54Z/
url https://www.mozilla.org/security/advisories/mfsa2024-64/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
reference_id mfsa2024-67
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-67/
reference_id mfsa2024-67
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:32:54Z/
url https://www.mozilla.org/security/advisories/mfsa2024-67/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
reference_id mfsa2024-68
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-68/
reference_id mfsa2024-68
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:32:54Z/
url https://www.mozilla.org/security/advisories/mfsa2024-68/
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1921458
reference_id show_bug.cgi?id=1921458
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:32:54Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1921458
fixed_packages
0
url pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@128.5.0-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community
aliases CVE-2024-11693
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f4ja-2ydw-cufu
6
url VCID-grjt-j4at-pqbp
vulnerability_id VCID-grjt-j4at-pqbp
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11692.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11692.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11692
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24953
published_at 2026-04-18T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.2514
published_at 2026-04-04T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24914
published_at 2026-04-07T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24961
published_at 2026-04-16T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24948
published_at 2026-04-13T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25028
published_at 2026-04-09T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24983
published_at 2026-04-08T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25101
published_at 2026-04-02T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.25002
published_at 2026-04-12T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25042
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11692
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11692
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328946
reference_id 2328946
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328946
5
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
6
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
7
reference_url https://security.gentoo.org/glsa/202509-02
reference_id GLSA-202509-02
reference_type
scores
url https://security.gentoo.org/glsa/202509-02
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
reference_id mfsa2024-63
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-63/
reference_id mfsa2024-63
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-63/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
reference_id mfsa2024-64
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-64/
reference_id mfsa2024-64
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-64/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
reference_id mfsa2024-67
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-67/
reference_id mfsa2024-67
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-67/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
reference_id mfsa2024-68
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-68/
reference_id mfsa2024-68
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-68/
16
reference_url https://access.redhat.com/errata/RHSA-2024:10591
reference_id RHSA-2024:10591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10591
17
reference_url https://access.redhat.com/errata/RHSA-2024:10592
reference_id RHSA-2024:10592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10592
18
reference_url https://access.redhat.com/errata/RHSA-2024:10667
reference_id RHSA-2024:10667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10667
19
reference_url https://access.redhat.com/errata/RHSA-2024:10702
reference_id RHSA-2024:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10702
20
reference_url https://access.redhat.com/errata/RHSA-2024:10703
reference_id RHSA-2024:10703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10703
21
reference_url https://access.redhat.com/errata/RHSA-2024:10704
reference_id RHSA-2024:10704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10704
22
reference_url https://access.redhat.com/errata/RHSA-2024:10710
reference_id RHSA-2024:10710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10710
23
reference_url https://access.redhat.com/errata/RHSA-2024:10733
reference_id RHSA-2024:10733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10733
24
reference_url https://access.redhat.com/errata/RHSA-2024:10734
reference_id RHSA-2024:10734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10734
25
reference_url https://access.redhat.com/errata/RHSA-2024:10742
reference_id RHSA-2024:10742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10742
26
reference_url https://access.redhat.com/errata/RHSA-2024:10743
reference_id RHSA-2024:10743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10743
27
reference_url https://access.redhat.com/errata/RHSA-2024:10745
reference_id RHSA-2024:10745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10745
28
reference_url https://access.redhat.com/errata/RHSA-2024:10748
reference_id RHSA-2024:10748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10748
29
reference_url https://access.redhat.com/errata/RHSA-2024:10752
reference_id RHSA-2024:10752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10752
30
reference_url https://access.redhat.com/errata/RHSA-2024:10844
reference_id RHSA-2024:10844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10844
31
reference_url https://access.redhat.com/errata/RHSA-2024:10848
reference_id RHSA-2024:10848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10848
32
reference_url https://access.redhat.com/errata/RHSA-2024:10849
reference_id RHSA-2024:10849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10849
33
reference_url https://access.redhat.com/errata/RHSA-2024:10880
reference_id RHSA-2024:10880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10880
34
reference_url https://access.redhat.com/errata/RHSA-2024:10881
reference_id RHSA-2024:10881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10881
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1909535
reference_id show_bug.cgi?id=1909535
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1909535
36
reference_url https://usn.ubuntu.com/7134-1/
reference_id USN-7134-1
reference_type
scores
url https://usn.ubuntu.com/7134-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@128.5.0-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community
aliases CVE-2024-11692
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-grjt-j4at-pqbp
7
url VCID-w7gj-shrq-3fcz
vulnerability_id VCID-w7gj-shrq-3fcz
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11699.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11699.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11699
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26272
published_at 2026-04-02T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26163
published_at 2026-04-12T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26208
published_at 2026-04-11T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26201
published_at 2026-04-09T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26152
published_at 2026-04-08T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26085
published_at 2026-04-07T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26313
published_at 2026-04-04T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26109
published_at 2026-04-16T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26104
published_at 2026-04-13T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32054
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11699
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11699
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328947
reference_id 2328947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328947
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1880582%2C1929911
reference_id buglist.cgi?bug_id=1880582%2C1929911
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1880582%2C1929911
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
8
reference_url https://security.gentoo.org/glsa/202509-02
reference_id GLSA-202509-02
reference_type
scores
url https://security.gentoo.org/glsa/202509-02
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
reference_id mfsa2024-63
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-63
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-63/
reference_id mfsa2024-63
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/
url https://www.mozilla.org/security/advisories/mfsa2024-63/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
reference_id mfsa2024-64
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-64
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-64/
reference_id mfsa2024-64
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/
url https://www.mozilla.org/security/advisories/mfsa2024-64/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
reference_id mfsa2024-67
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-67
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-67/
reference_id mfsa2024-67
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/
url https://www.mozilla.org/security/advisories/mfsa2024-67/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
reference_id mfsa2024-68
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-68
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-68/
reference_id mfsa2024-68
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/
url https://www.mozilla.org/security/advisories/mfsa2024-68/
17
reference_url https://access.redhat.com/errata/RHSA-2024:10591
reference_id RHSA-2024:10591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10591
18
reference_url https://access.redhat.com/errata/RHSA-2024:10592
reference_id RHSA-2024:10592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10592
19
reference_url https://access.redhat.com/errata/RHSA-2024:10667
reference_id RHSA-2024:10667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10667
20
reference_url https://access.redhat.com/errata/RHSA-2024:10702
reference_id RHSA-2024:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10702
21
reference_url https://access.redhat.com/errata/RHSA-2024:10703
reference_id RHSA-2024:10703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10703
22
reference_url https://access.redhat.com/errata/RHSA-2024:10704
reference_id RHSA-2024:10704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10704
23
reference_url https://access.redhat.com/errata/RHSA-2024:10710
reference_id RHSA-2024:10710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10710
24
reference_url https://access.redhat.com/errata/RHSA-2024:10733
reference_id RHSA-2024:10733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10733
25
reference_url https://access.redhat.com/errata/RHSA-2024:10734
reference_id RHSA-2024:10734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10734
26
reference_url https://access.redhat.com/errata/RHSA-2024:10742
reference_id RHSA-2024:10742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10742
27
reference_url https://access.redhat.com/errata/RHSA-2024:10743
reference_id RHSA-2024:10743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10743
28
reference_url https://access.redhat.com/errata/RHSA-2024:10745
reference_id RHSA-2024:10745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10745
29
reference_url https://access.redhat.com/errata/RHSA-2024:10748
reference_id RHSA-2024:10748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10748
30
reference_url https://access.redhat.com/errata/RHSA-2024:10752
reference_id RHSA-2024:10752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10752
31
reference_url https://access.redhat.com/errata/RHSA-2024:10844
reference_id RHSA-2024:10844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10844
32
reference_url https://access.redhat.com/errata/RHSA-2024:10848
reference_id RHSA-2024:10848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10848
33
reference_url https://access.redhat.com/errata/RHSA-2024:10849
reference_id RHSA-2024:10849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10849
34
reference_url https://access.redhat.com/errata/RHSA-2024:10880
reference_id RHSA-2024:10880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10880
35
reference_url https://access.redhat.com/errata/RHSA-2024:10881
reference_id RHSA-2024:10881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10881
36
reference_url https://usn.ubuntu.com/7134-1/
reference_id USN-7134-1
reference_type
scores
url https://usn.ubuntu.com/7134-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@128.5.0-r0?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@128.5.0-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community
aliases CVE-2024-11699
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w7gj-shrq-3fcz
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@128.5.0-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community