Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/firefox@121.0-1?distro=sid
Typedeb
Namespacedebian
Namefirefox
Version121.0-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version122.0-1
Latest_non_vulnerable_version149.0.2-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2j1e-fjx6-tucr
vulnerability_id VCID-2j1e-fjx6-tucr
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6872
reference_id
reference_type
scores
0
value 0.00251
scoring_system epss
scoring_elements 0.48478
published_at 2026-04-21T12:55:00Z
1
value 0.00251
scoring_system epss
scoring_elements 0.48442
published_at 2026-04-02T12:55:00Z
2
value 0.00251
scoring_system epss
scoring_elements 0.48462
published_at 2026-04-12T12:55:00Z
3
value 0.00251
scoring_system epss
scoring_elements 0.48475
published_at 2026-04-13T12:55:00Z
4
value 0.00251
scoring_system epss
scoring_elements 0.48525
published_at 2026-04-16T12:55:00Z
5
value 0.00251
scoring_system epss
scoring_elements 0.4852
published_at 2026-04-18T12:55:00Z
6
value 0.00251
scoring_system epss
scoring_elements 0.48464
published_at 2026-04-04T12:55:00Z
7
value 0.00251
scoring_system epss
scoring_elements 0.48416
published_at 2026-04-07T12:55:00Z
8
value 0.00251
scoring_system epss
scoring_elements 0.48471
published_at 2026-04-08T12:55:00Z
9
value 0.00251
scoring_system epss
scoring_elements 0.48465
published_at 2026-04-09T12:55:00Z
10
value 0.00251
scoring_system epss
scoring_elements 0.48488
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6872
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-21T20:34:05Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1849186
reference_id show_bug.cgi?id=1849186
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-21T20:34:05Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1849186
4
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6872
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2j1e-fjx6-tucr
1
url VCID-3nrj-5r53-37ab
vulnerability_id VCID-3nrj-5r53-37ab
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6135.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6135.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6135
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.36019
published_at 2026-04-02T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35875
published_at 2026-04-21T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35922
published_at 2026-04-12T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35898
published_at 2026-04-13T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35938
published_at 2026-04-16T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35925
published_at 2026-04-18T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.3605
published_at 2026-04-04T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35881
published_at 2026-04-07T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35932
published_at 2026-04-08T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35955
published_at 2026-04-09T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.35961
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6135
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059054
reference_id 1059054
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059054
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2249906
reference_id 2249906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2249906
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
6
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:59:00Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
7
reference_url https://access.redhat.com/errata/RHSA-2024:0785
reference_id RHSA-2024:0785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0785
8
reference_url https://access.redhat.com/errata/RHSA-2024:0786
reference_id RHSA-2024:0786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0786
9
reference_url https://access.redhat.com/errata/RHSA-2024:0790
reference_id RHSA-2024:0790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0790
10
reference_url https://access.redhat.com/errata/RHSA-2024:0791
reference_id RHSA-2024:0791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0791
11
reference_url https://access.redhat.com/errata/RHSA-2024:1686
reference_id RHSA-2024:1686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1686
12
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
13
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
14
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
15
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1853908
reference_id show_bug.cgi?id=1853908
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:59:00Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1853908
17
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
18
reference_url https://usn.ubuntu.com/6727-1/
reference_id USN-6727-1
reference_type
scores
url https://usn.ubuntu.com/6727-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6135
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3nrj-5r53-37ab
2
url VCID-4g3s-bh4t-qqhc
vulnerability_id VCID-4g3s-bh4t-qqhc
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6867.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6867.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6867
reference_id
reference_type
scores
0
value 0.00857
scoring_system epss
scoring_elements 0.75021
published_at 2026-04-21T12:55:00Z
1
value 0.00931
scoring_system epss
scoring_elements 0.7608
published_at 2026-04-04T12:55:00Z
2
value 0.00931
scoring_system epss
scoring_elements 0.76048
published_at 2026-04-02T12:55:00Z
3
value 0.00931
scoring_system epss
scoring_elements 0.7606
published_at 2026-04-07T12:55:00Z
4
value 0.00931
scoring_system epss
scoring_elements 0.76093
published_at 2026-04-08T12:55:00Z
5
value 0.00931
scoring_system epss
scoring_elements 0.76107
published_at 2026-04-09T12:55:00Z
6
value 0.00931
scoring_system epss
scoring_elements 0.76132
published_at 2026-04-11T12:55:00Z
7
value 0.00931
scoring_system epss
scoring_elements 0.76108
published_at 2026-04-12T12:55:00Z
8
value 0.00931
scoring_system epss
scoring_elements 0.76106
published_at 2026-04-13T12:55:00Z
9
value 0.00931
scoring_system epss
scoring_elements 0.76147
published_at 2026-04-16T12:55:00Z
10
value 0.00931
scoring_system epss
scoring_elements 0.7615
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6867
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255366
reference_id 2255366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255366
14
reference_url https://www.debian.org/security/2023/dsa-5581
reference_id dsa-5581
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://www.debian.org/security/2023/dsa-5581
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-54/
reference_id mfsa2023-54
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://www.mozilla.org/security/advisories/mfsa2023-54/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
19
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
20
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
21
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
22
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
23
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
24
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
25
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
26
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
27
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
28
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
29
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1863863
reference_id show_bug.cgi?id=1863863
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1863863
30
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6867
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4g3s-bh4t-qqhc
3
url VCID-4xqc-2rzu-y3aj
vulnerability_id VCID-4xqc-2rzu-y3aj
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6873
reference_id
reference_type
scores
0
value 0.00384
scoring_system epss
scoring_elements 0.59721
published_at 2026-04-21T12:55:00Z
1
value 0.00384
scoring_system epss
scoring_elements 0.59651
published_at 2026-04-02T12:55:00Z
2
value 0.00384
scoring_system epss
scoring_elements 0.59676
published_at 2026-04-04T12:55:00Z
3
value 0.00384
scoring_system epss
scoring_elements 0.59646
published_at 2026-04-07T12:55:00Z
4
value 0.00384
scoring_system epss
scoring_elements 0.59697
published_at 2026-04-08T12:55:00Z
5
value 0.00384
scoring_system epss
scoring_elements 0.59711
published_at 2026-04-09T12:55:00Z
6
value 0.00384
scoring_system epss
scoring_elements 0.5973
published_at 2026-04-11T12:55:00Z
7
value 0.00384
scoring_system epss
scoring_elements 0.59714
published_at 2026-04-12T12:55:00Z
8
value 0.00384
scoring_system epss
scoring_elements 0.59695
published_at 2026-04-13T12:55:00Z
9
value 0.00384
scoring_system epss
scoring_elements 0.59729
published_at 2026-04-16T12:55:00Z
10
value 0.00384
scoring_system epss
scoring_elements 0.59736
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6873
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
13
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6873
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xqc-2rzu-y3aj
4
url VCID-9saf-1zax-5ycy
vulnerability_id VCID-9saf-1zax-5ycy
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6865.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6865.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6865
reference_id
reference_type
scores
0
value 0.00414
scoring_system epss
scoring_elements 0.61565
published_at 2026-04-21T12:55:00Z
1
value 0.00682
scoring_system epss
scoring_elements 0.7159
published_at 2026-04-04T12:55:00Z
2
value 0.00682
scoring_system epss
scoring_elements 0.71563
published_at 2026-04-07T12:55:00Z
3
value 0.00682
scoring_system epss
scoring_elements 0.71603
published_at 2026-04-08T12:55:00Z
4
value 0.00682
scoring_system epss
scoring_elements 0.71614
published_at 2026-04-09T12:55:00Z
5
value 0.00682
scoring_system epss
scoring_elements 0.71572
published_at 2026-04-02T12:55:00Z
6
value 0.00682
scoring_system epss
scoring_elements 0.71647
published_at 2026-04-16T12:55:00Z
7
value 0.00682
scoring_system epss
scoring_elements 0.71652
published_at 2026-04-18T12:55:00Z
8
value 0.00682
scoring_system epss
scoring_elements 0.71637
published_at 2026-04-11T12:55:00Z
9
value 0.00682
scoring_system epss
scoring_elements 0.71621
published_at 2026-04-12T12:55:00Z
10
value 0.00682
scoring_system epss
scoring_elements 0.71602
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6865
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255361
reference_id 2255361
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255361
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
16
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
17
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
18
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
19
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
20
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
21
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
22
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
23
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
24
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
25
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6865
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9saf-1zax-5ycy
5
url VCID-9z3s-qfbc-vbdc
vulnerability_id VCID-9z3s-qfbc-vbdc
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6859
reference_id
reference_type
scores
0
value 0.00375
scoring_system epss
scoring_elements 0.59175
published_at 2026-04-21T12:55:00Z
1
value 0.00449
scoring_system epss
scoring_elements 0.63625
published_at 2026-04-08T12:55:00Z
2
value 0.00449
scoring_system epss
scoring_elements 0.63608
published_at 2026-04-13T12:55:00Z
3
value 0.00449
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-16T12:55:00Z
4
value 0.00449
scoring_system epss
scoring_elements 0.63654
published_at 2026-04-18T12:55:00Z
5
value 0.00449
scoring_system epss
scoring_elements 0.63583
published_at 2026-04-02T12:55:00Z
6
value 0.00449
scoring_system epss
scoring_elements 0.63609
published_at 2026-04-04T12:55:00Z
7
value 0.00449
scoring_system epss
scoring_elements 0.63573
published_at 2026-04-07T12:55:00Z
8
value 0.00449
scoring_system epss
scoring_elements 0.63641
published_at 2026-04-12T12:55:00Z
9
value 0.00449
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6859
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255364
reference_id 2255364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255364
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6859
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9z3s-qfbc-vbdc
6
url VCID-a3g7-atnx-jyg4
vulnerability_id VCID-a3g7-atnx-jyg4
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6869
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.39963
published_at 2026-04-21T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.40051
published_at 2026-04-02T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40052
published_at 2026-04-08T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40066
published_at 2026-04-09T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40077
published_at 2026-04-11T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.4004
published_at 2026-04-12T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40021
published_at 2026-04-13T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.4007
published_at 2026-04-16T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.40041
published_at 2026-04-18T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40078
published_at 2026-04-04T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.39999
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6869
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:22:28Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1799036
reference_id show_bug.cgi?id=1799036
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:22:28Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1799036
4
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6869
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3g7-atnx-jyg4
7
url VCID-azpr-25fb-5qba
vulnerability_id VCID-azpr-25fb-5qba
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6871
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.3782
published_at 2026-04-21T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37936
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37962
published_at 2026-04-04T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37839
published_at 2026-04-07T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37889
published_at 2026-04-08T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37902
published_at 2026-04-16T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37917
published_at 2026-04-11T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37881
published_at 2026-04-12T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37856
published_at 2026-04-13T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37882
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6871
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
2
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6871
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azpr-25fb-5qba
8
url VCID-bw96-5g6y-j3c4
vulnerability_id VCID-bw96-5g6y-j3c4
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6860
reference_id
reference_type
scores
0
value 0.00449
scoring_system epss
scoring_elements 0.63638
published_at 2026-04-21T12:55:00Z
1
value 0.00471
scoring_system epss
scoring_elements 0.64619
published_at 2026-04-08T12:55:00Z
2
value 0.00471
scoring_system epss
scoring_elements 0.64612
published_at 2026-04-13T12:55:00Z
3
value 0.00471
scoring_system epss
scoring_elements 0.64648
published_at 2026-04-16T12:55:00Z
4
value 0.00471
scoring_system epss
scoring_elements 0.64659
published_at 2026-04-18T12:55:00Z
5
value 0.00471
scoring_system epss
scoring_elements 0.64584
published_at 2026-04-02T12:55:00Z
6
value 0.00471
scoring_system epss
scoring_elements 0.64613
published_at 2026-04-04T12:55:00Z
7
value 0.00471
scoring_system epss
scoring_elements 0.64571
published_at 2026-04-07T12:55:00Z
8
value 0.00471
scoring_system epss
scoring_elements 0.64636
published_at 2026-04-09T12:55:00Z
9
value 0.00471
scoring_system epss
scoring_elements 0.64653
published_at 2026-04-11T12:55:00Z
10
value 0.00471
scoring_system epss
scoring_elements 0.6464
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6860
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255365
reference_id 2255365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255365
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6860
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bw96-5g6y-j3c4
9
url VCID-f6qv-znt2-2bd5
vulnerability_id VCID-f6qv-znt2-2bd5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6863
reference_id
reference_type
scores
0
value 0.00464
scoring_system epss
scoring_elements 0.6437
published_at 2026-04-21T12:55:00Z
1
value 0.00504
scoring_system epss
scoring_elements 0.66189
published_at 2026-04-08T12:55:00Z
2
value 0.00504
scoring_system epss
scoring_elements 0.66178
published_at 2026-04-13T12:55:00Z
3
value 0.00504
scoring_system epss
scoring_elements 0.66214
published_at 2026-04-16T12:55:00Z
4
value 0.00504
scoring_system epss
scoring_elements 0.66228
published_at 2026-04-18T12:55:00Z
5
value 0.00504
scoring_system epss
scoring_elements 0.66146
published_at 2026-04-02T12:55:00Z
6
value 0.00504
scoring_system epss
scoring_elements 0.66173
published_at 2026-04-04T12:55:00Z
7
value 0.00504
scoring_system epss
scoring_elements 0.66141
published_at 2026-04-07T12:55:00Z
8
value 0.00504
scoring_system epss
scoring_elements 0.66203
published_at 2026-04-09T12:55:00Z
9
value 0.00504
scoring_system epss
scoring_elements 0.66222
published_at 2026-04-11T12:55:00Z
10
value 0.00504
scoring_system epss
scoring_elements 0.66209
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6863
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255369
reference_id 2255369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255369
14
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
18
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
19
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
20
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
21
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
22
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
23
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
24
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
25
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
26
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
27
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
28
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
29
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
30
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
31
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
32
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
33
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
34
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
35
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
36
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
37
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6863
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f6qv-znt2-2bd5
10
url VCID-gd3w-dp7g-c7bv
vulnerability_id VCID-gd3w-dp7g-c7bv
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6866
reference_id
reference_type
scores
0
value 0.01258
scoring_system epss
scoring_elements 0.7942
published_at 2026-04-18T12:55:00Z
1
value 0.01258
scoring_system epss
scoring_elements 0.79358
published_at 2026-04-07T12:55:00Z
2
value 0.01258
scoring_system epss
scoring_elements 0.79385
published_at 2026-04-08T12:55:00Z
3
value 0.01258
scoring_system epss
scoring_elements 0.79394
published_at 2026-04-09T12:55:00Z
4
value 0.01258
scoring_system epss
scoring_elements 0.79417
published_at 2026-04-11T12:55:00Z
5
value 0.01258
scoring_system epss
scoring_elements 0.79401
published_at 2026-04-12T12:55:00Z
6
value 0.01258
scoring_system epss
scoring_elements 0.7939
published_at 2026-04-13T12:55:00Z
7
value 0.01258
scoring_system epss
scoring_elements 0.79422
published_at 2026-04-21T12:55:00Z
8
value 0.01258
scoring_system epss
scoring_elements 0.7935
published_at 2026-04-02T12:55:00Z
9
value 0.01258
scoring_system epss
scoring_elements 0.79372
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6866
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-27T18:53:04Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1849037
reference_id show_bug.cgi?id=1849037
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-27T18:53:04Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1849037
4
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6866
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gd3w-dp7g-c7bv
11
url VCID-kskc-agaw-8bcr
vulnerability_id VCID-kskc-agaw-8bcr
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6857
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40745
published_at 2026-04-18T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40775
published_at 2026-04-16T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40755
published_at 2026-04-02T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40783
published_at 2026-04-11T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40707
published_at 2026-04-07T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40757
published_at 2026-04-08T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40764
published_at 2026-04-09T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.4073
published_at 2026-04-13T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40749
published_at 2026-04-12T12:55:00Z
9
value 0.00227
scoring_system epss
scoring_elements 0.45504
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6857
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255362
reference_id 2255362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255362
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6857
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kskc-agaw-8bcr
12
url VCID-pepm-1t68-uuf1
vulnerability_id VCID-pepm-1t68-uuf1
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6864
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.65706
published_at 2026-04-21T12:55:00Z
1
value 0.0059
scoring_system epss
scoring_elements 0.69182
published_at 2026-04-08T12:55:00Z
2
value 0.0059
scoring_system epss
scoring_elements 0.6918
published_at 2026-04-13T12:55:00Z
3
value 0.0059
scoring_system epss
scoring_elements 0.69219
published_at 2026-04-16T12:55:00Z
4
value 0.0059
scoring_system epss
scoring_elements 0.69228
published_at 2026-04-18T12:55:00Z
5
value 0.0059
scoring_system epss
scoring_elements 0.6913
published_at 2026-04-02T12:55:00Z
6
value 0.0059
scoring_system epss
scoring_elements 0.69151
published_at 2026-04-04T12:55:00Z
7
value 0.0059
scoring_system epss
scoring_elements 0.69132
published_at 2026-04-07T12:55:00Z
8
value 0.0059
scoring_system epss
scoring_elements 0.69201
published_at 2026-04-09T12:55:00Z
9
value 0.0059
scoring_system epss
scoring_elements 0.69223
published_at 2026-04-11T12:55:00Z
10
value 0.0059
scoring_system epss
scoring_elements 0.69208
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6864
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255370
reference_id 2255370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255370
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6864
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pepm-1t68-uuf1
13
url VCID-qdqj-rhcr-wbca
vulnerability_id VCID-qdqj-rhcr-wbca
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6856
reference_id
reference_type
scores
0
value 0.10471
scoring_system epss
scoring_elements 0.93268
published_at 2026-04-21T12:55:00Z
1
value 0.10986
scoring_system epss
scoring_elements 0.93413
published_at 2026-04-08T12:55:00Z
2
value 0.10986
scoring_system epss
scoring_elements 0.93422
published_at 2026-04-13T12:55:00Z
3
value 0.10986
scoring_system epss
scoring_elements 0.93441
published_at 2026-04-16T12:55:00Z
4
value 0.10986
scoring_system epss
scoring_elements 0.93446
published_at 2026-04-18T12:55:00Z
5
value 0.10986
scoring_system epss
scoring_elements 0.93397
published_at 2026-04-02T12:55:00Z
6
value 0.10986
scoring_system epss
scoring_elements 0.93405
published_at 2026-04-07T12:55:00Z
7
value 0.10986
scoring_system epss
scoring_elements 0.93416
published_at 2026-04-09T12:55:00Z
8
value 0.10986
scoring_system epss
scoring_elements 0.93421
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6856
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255360
reference_id 2255360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255360
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6856
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqj-rhcr-wbca
14
url VCID-tps4-kxe2-5ugb
vulnerability_id VCID-tps4-kxe2-5ugb
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6858
reference_id
reference_type
scores
0
value 0.00417
scoring_system epss
scoring_elements 0.61769
published_at 2026-04-21T12:55:00Z
1
value 0.00452
scoring_system epss
scoring_elements 0.63778
published_at 2026-04-16T12:55:00Z
2
value 0.00452
scoring_system epss
scoring_elements 0.63723
published_at 2026-04-02T12:55:00Z
3
value 0.00452
scoring_system epss
scoring_elements 0.63748
published_at 2026-04-04T12:55:00Z
4
value 0.00452
scoring_system epss
scoring_elements 0.63788
published_at 2026-04-18T12:55:00Z
5
value 0.00452
scoring_system epss
scoring_elements 0.6376
published_at 2026-04-08T12:55:00Z
6
value 0.00452
scoring_system epss
scoring_elements 0.63708
published_at 2026-04-07T12:55:00Z
7
value 0.00452
scoring_system epss
scoring_elements 0.63742
published_at 2026-04-13T12:55:00Z
8
value 0.00452
scoring_system epss
scoring_elements 0.63776
published_at 2026-04-12T12:55:00Z
9
value 0.00452
scoring_system epss
scoring_elements 0.63791
published_at 2026-04-11T12:55:00Z
10
value 0.00452
scoring_system epss
scoring_elements 0.63777
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6858
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255363
reference_id 2255363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255363
17
reference_url https://www.debian.org/security/2023/dsa-5581
reference_id dsa-5581
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.debian.org/security/2023/dsa-5581
18
reference_url https://www.debian.org/security/2023/dsa-5582
reference_id dsa-5582
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.debian.org/security/2023/dsa-5582
19
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
21
reference_url https://www.mozilla.org/security/advisories/mfsa2023-54/
reference_id mfsa2023-54
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.mozilla.org/security/advisories/mfsa2023-54/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
23
reference_url https://www.mozilla.org/security/advisories/mfsa2023-55/
reference_id mfsa2023-55
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.mozilla.org/security/advisories/mfsa2023-55/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
25
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
26
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
27
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
28
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
29
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
30
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
31
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
32
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
33
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
34
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
35
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
36
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
37
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
38
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
39
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
40
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
41
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
42
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
43
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
44
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
45
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
46
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1826791
reference_id show_bug.cgi?id=1826791
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1826791
47
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
48
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6858
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tps4-kxe2-5ugb
15
url VCID-zhu4-sy56-1yea
vulnerability_id VCID-zhu4-sy56-1yea
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6861
reference_id
reference_type
scores
0
value 0.00415
scoring_system epss
scoring_elements 0.6171
published_at 2026-04-18T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61704
published_at 2026-04-16T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61609
published_at 2026-04-07T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61639
published_at 2026-04-04T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.61658
published_at 2026-04-08T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61672
published_at 2026-04-09T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.61694
published_at 2026-04-11T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61663
published_at 2026-04-13T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61682
published_at 2026-04-12T12:55:00Z
9
value 0.00499
scoring_system epss
scoring_elements 0.65975
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6861
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255367
reference_id 2255367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255367
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:deb/debian/firefox@121.0-1?distro=sid
purl pkg:deb/debian/firefox@121.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-6861
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhu4-sy56-1yea
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@121.0-1%3Fdistro=sid